Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe
Resource
win10v2004-20240611-en
General
-
Target
b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe
-
Size
225KB
-
MD5
3924b63a3fcc471a71870994c8384cb3
-
SHA1
dddec0589cae6896e54434b01e16bc2f2c10f3ce
-
SHA256
b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b
-
SHA512
587502167457afc7fd986c3b5a5431b715c1aebb9632d6c4cbe924124ee87a6b6f591520473cbb4878d78526d31d3424988071db898fdc71f8ecdcf48d3bd3c7
-
SSDEEP
6144:xA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:xATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\CC75B8B8 = "C:\\Users\\Admin\\AppData\\Roaming\\CC75B8B8\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
winver.exepid process 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 2904 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exewinver.exedescription pid process target process PID 2188 wrote to memory of 2904 2188 b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe winver.exe PID 2188 wrote to memory of 2904 2188 b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe winver.exe PID 2188 wrote to memory of 2904 2188 b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe winver.exe PID 2188 wrote to memory of 2904 2188 b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe winver.exe PID 2188 wrote to memory of 2904 2188 b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe winver.exe PID 2904 wrote to memory of 1192 2904 winver.exe Explorer.EXE PID 2904 wrote to memory of 1100 2904 winver.exe taskhost.exe PID 2904 wrote to memory of 1160 2904 winver.exe Dwm.exe PID 2904 wrote to memory of 1192 2904 winver.exe Explorer.EXE PID 2904 wrote to memory of 2188 2904 winver.exe b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe"C:\Users\Admin\AppData\Local\Temp\b8abcf4ca1f0843a3eedefbde7a6d23ba97d6799ed41e65e51e9e07c38ee6a2b.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1100-9-0x0000000000250000-0x0000000000256000-memory.dmpFilesize
24KB
-
memory/1100-23-0x0000000000250000-0x0000000000256000-memory.dmpFilesize
24KB
-
memory/1160-25-0x0000000002010000-0x0000000002016000-memory.dmpFilesize
24KB
-
memory/1160-12-0x0000000002010000-0x0000000002016000-memory.dmpFilesize
24KB
-
memory/1192-24-0x0000000002DC0000-0x0000000002DC6000-memory.dmpFilesize
24KB
-
memory/1192-15-0x0000000002DC0000-0x0000000002DC6000-memory.dmpFilesize
24KB
-
memory/1192-3-0x0000000002DB0000-0x0000000002DB6000-memory.dmpFilesize
24KB
-
memory/1192-6-0x0000000002DB0000-0x0000000002DB6000-memory.dmpFilesize
24KB
-
memory/1192-1-0x0000000002DB0000-0x0000000002DB6000-memory.dmpFilesize
24KB
-
memory/2188-22-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2904-20-0x0000000000210000-0x0000000000216000-memory.dmpFilesize
24KB
-
memory/2904-4-0x0000000000120000-0x0000000000126000-memory.dmpFilesize
24KB
-
memory/2904-27-0x0000000000210000-0x0000000000216000-memory.dmpFilesize
24KB