Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 10:24
Behavioral task
behavioral1
Sample
9c1394cbc126c093d724a57ad6d370c0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9c1394cbc126c093d724a57ad6d370c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
9c1394cbc126c093d724a57ad6d370c0N.exe
-
Size
41KB
-
MD5
9c1394cbc126c093d724a57ad6d370c0
-
SHA1
315faba6a8380419f3e2c7ece49902bf7546282b
-
SHA256
9cf4d41de48750840c904914f6730eb7a36a132e85a4fb551fa91d7d399a1aa6
-
SHA512
ae23320377a3164715ecd046d51dd8ad8232fc70b9ebd077a750c1c5b5ef4ec6ca2917d06c3639577db16a4e85395cc28ef1250f337c9ce65d6f2f64de6c0098
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 services.exe -
resource yara_rule behavioral1/memory/2976-2-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2976-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0008000000016d46-9.dat upx behavioral1/memory/3036-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2976-17-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/3036-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3036-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3036-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3036-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3036-35-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3036-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3036-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3036-47-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3036-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2976-53-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/3036-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2976-58-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/3036-59-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0035000000016cd7-69.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 9c1394cbc126c093d724a57ad6d370c0N.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 9c1394cbc126c093d724a57ad6d370c0N.exe File opened for modification C:\Windows\java.exe 9c1394cbc126c093d724a57ad6d370c0N.exe File created C:\Windows\java.exe 9c1394cbc126c093d724a57ad6d370c0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3036 2976 9c1394cbc126c093d724a57ad6d370c0N.exe 30 PID 2976 wrote to memory of 3036 2976 9c1394cbc126c093d724a57ad6d370c0N.exe 30 PID 2976 wrote to memory of 3036 2976 9c1394cbc126c093d724a57ad6d370c0N.exe 30 PID 2976 wrote to memory of 3036 2976 9c1394cbc126c093d724a57ad6d370c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c1394cbc126c093d724a57ad6d370c0N.exe"C:\Users\Admin\AppData\Local\Temp\9c1394cbc126c093d724a57ad6d370c0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5b3e9a6f8d5f25b0c3bc2657e60ed81c9
SHA11741686f9e1694557b100a03d7759319dbad5b7a
SHA256994a2553a560bc8881a23bd171f3588f5a6f59e06dc67c2d9e4e3b7d289d85a3
SHA5125f509c706a9cdfba06d076d6b5849eda967bd6c00ab8abbd2fa3811599d76f04cc3441fb31389f21a394d30e1661f1c7fbd49a10f321873f2582238e3c081974
-
Filesize
192B
MD5fc27a323779b2e0951dd40f2f36d0e2a
SHA1896f20f527e0fc5ec7d665d68eb6869c37cd4d65
SHA256b0c963a376a84cea68014b44f80ef8889538d4071b68c8f0c5fab7fe925582af
SHA512f81a2d244ed911ed24a08796bd3b4dd42b15c8f4dcb358813045e1dc9ed90f71d8b1ef9031ea6bdc78e026d03f53ee628a19a1c2cd7e036666242b7122d062fc
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2