Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe
Resource
win10v2004-20240508-en
General
-
Target
4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe
-
Size
237KB
-
MD5
f1991c3ddc6d2df68e80627da375b71d
-
SHA1
e75efd346eccdd99a1e206f6a87542477249e5d0
-
SHA256
4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787
-
SHA512
3957fb1b4bb9ee26a198b1ba19ce5f99ddc45f14ed20167a37e7275105f822e00751d373bb6dd5c5d747588dd0ba5f3818ca3ea9b9a38666ce61d51336c790a8
-
SSDEEP
6144:XA2P27yTAnKGw0hjFhSR/W1nyAJ9v0pMtRCpYQ:XATuTAnKGwUAWVycQqgj
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\2AD2B042 = "C:\\Users\\Admin\\AppData\\Roaming\\2AD2B042\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
winver.exepid process 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe 2728 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 2728 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exewinver.exedescription pid process target process PID 2236 wrote to memory of 2728 2236 4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe winver.exe PID 2236 wrote to memory of 2728 2236 4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe winver.exe PID 2236 wrote to memory of 2728 2236 4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe winver.exe PID 2236 wrote to memory of 2728 2236 4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe winver.exe PID 2236 wrote to memory of 2728 2236 4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe winver.exe PID 2728 wrote to memory of 1208 2728 winver.exe Explorer.EXE PID 2728 wrote to memory of 1100 2728 winver.exe taskhost.exe PID 2728 wrote to memory of 1184 2728 winver.exe Dwm.exe PID 2728 wrote to memory of 1208 2728 winver.exe Explorer.EXE PID 2728 wrote to memory of 2236 2728 winver.exe 4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe"C:\Users\Admin\AppData\Local\Temp\4ff8c32b5123d47bea4a1b1d850778f81fcdc21f177e18bae0481c35a282c787.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1100-23-0x0000000000410000-0x0000000000416000-memory.dmpFilesize
24KB
-
memory/1100-11-0x0000000000410000-0x0000000000416000-memory.dmpFilesize
24KB
-
memory/1184-14-0x00000000001C0000-0x00000000001C6000-memory.dmpFilesize
24KB
-
memory/1184-25-0x00000000001C0000-0x00000000001C6000-memory.dmpFilesize
24KB
-
memory/1208-1-0x0000000002E70000-0x0000000002E76000-memory.dmpFilesize
24KB
-
memory/1208-17-0x0000000002EC0000-0x0000000002EC6000-memory.dmpFilesize
24KB
-
memory/1208-6-0x0000000002E70000-0x0000000002E76000-memory.dmpFilesize
24KB
-
memory/1208-3-0x0000000002E70000-0x0000000002E76000-memory.dmpFilesize
24KB
-
memory/1208-24-0x0000000002EC0000-0x0000000002EC6000-memory.dmpFilesize
24KB
-
memory/2236-8-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2728-22-0x0000000000290000-0x0000000000296000-memory.dmpFilesize
24KB
-
memory/2728-4-0x00000000001A0000-0x00000000001A6000-memory.dmpFilesize
24KB
-
memory/2728-27-0x0000000000290000-0x0000000000296000-memory.dmpFilesize
24KB