Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 01:33
Behavioral task
behavioral1
Sample
1d8b5274e26329f1b5dffbecf3b8b3f4.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1d8b5274e26329f1b5dffbecf3b8b3f4.exe
Resource
win10v2004-20240508-en
General
-
Target
1d8b5274e26329f1b5dffbecf3b8b3f4.exe
-
Size
898KB
-
MD5
1d8b5274e26329f1b5dffbecf3b8b3f4
-
SHA1
a6d0a24bd77e98c589efd158831ff05b5864c786
-
SHA256
6eede7c8af05dd28fe62bec856d7e7a276078e51da48539e083088dfee647d68
-
SHA512
242f76b538385c435a4ecd8361f11038ebfc9c47da0d55b148bdcc4a42c8f054b15ce1e07151e408cbf817a8abc381dfe6094c00378f538f40f1c2a54bfcb7b8
-
SSDEEP
12288:rbpHYUKy5U1bo9t8DMRSW9vbciUiLuAvOxMt11i27QitjUN:r5sJo6YrFUiyAak11LtjUN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1896 svchest000.exe -
resource yara_rule behavioral1/memory/772-0-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral1/memory/772-1-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral1/files/0x0048000000013391-7.dat upx behavioral1/memory/1896-10-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral1/memory/1896-11-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral1/memory/1896-14-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral1/memory/772-15-0x0000000000400000-0x0000000000597000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1d8b5274e26329f1b5dffbecf3b8b3f4.exe" 1d8b5274e26329f1b5dffbecf3b8b3f4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 772 1d8b5274e26329f1b5dffbecf3b8b3f4.exe 1896 svchest000.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 1d8b5274e26329f1b5dffbecf3b8b3f4.exe File opened for modification \??\c:\Windows\BJ.exe 1d8b5274e26329f1b5dffbecf3b8b3f4.exe File created \??\c:\Windows\svchest000.exe 1d8b5274e26329f1b5dffbecf3b8b3f4.exe File opened for modification \??\c:\Windows\svchest000.exe 1d8b5274e26329f1b5dffbecf3b8b3f4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 772 wrote to memory of 1896 772 1d8b5274e26329f1b5dffbecf3b8b3f4.exe 28 PID 772 wrote to memory of 1896 772 1d8b5274e26329f1b5dffbecf3b8b3f4.exe 28 PID 772 wrote to memory of 1896 772 1d8b5274e26329f1b5dffbecf3b8b3f4.exe 28 PID 772 wrote to memory of 1896 772 1d8b5274e26329f1b5dffbecf3b8b3f4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d8b5274e26329f1b5dffbecf3b8b3f4.exe"C:\Users\Admin\AppData\Local\Temp\1d8b5274e26329f1b5dffbecf3b8b3f4.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\Windows\svchest000.exec:\Windows\svchest000.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
898KB
MD51d8b5274e26329f1b5dffbecf3b8b3f4
SHA1a6d0a24bd77e98c589efd158831ff05b5864c786
SHA2566eede7c8af05dd28fe62bec856d7e7a276078e51da48539e083088dfee647d68
SHA512242f76b538385c435a4ecd8361f11038ebfc9c47da0d55b148bdcc4a42c8f054b15ce1e07151e408cbf817a8abc381dfe6094c00378f538f40f1c2a54bfcb7b8