Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
a17d72233158ea870a5dfdcd76a6d980N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a17d72233158ea870a5dfdcd76a6d980N.exe
Resource
win10v2004-20240802-en
General
-
Target
a17d72233158ea870a5dfdcd76a6d980N.exe
-
Size
534KB
-
MD5
a17d72233158ea870a5dfdcd76a6d980
-
SHA1
4aaf2ee0ea5f1f8a3e6f2a7345f308d6d61ab263
-
SHA256
22d42dfb28230bf63b51ddfe9d5e7301bc696963f9dfc445f0677dba7d2dc332
-
SHA512
c3c349af9874cd2d80413874e4649aaf2f1ad52e8d1d0ed6af3e480c74527682a53d3bfa640003fe68035505be0adde8b383d0200d9dc6216087cbe953456ae0
-
SSDEEP
6144:wlj7cMnU+OEXu78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAFd:wlbU+I85bM3npxYfj63hgD1Ziu
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2812 MSWDM.EXE 2768 MSWDM.EXE 2572 A17D72233158EA870A5DFDCD76A6D980N.EXE 2588 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2812 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" a17d72233158ea870a5dfdcd76a6d980N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" a17d72233158ea870a5dfdcd76a6d980N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE a17d72233158ea870a5dfdcd76a6d980N.exe File opened for modification C:\Windows\devE7EF.tmp a17d72233158ea870a5dfdcd76a6d980N.exe File opened for modification C:\Windows\devE7EF.tmp MSWDM.EXE -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A17D72233158EA870A5DFDCD76A6D980N.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a17d72233158ea870a5dfdcd76a6d980N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2812 MSWDM.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2572 A17D72233158EA870A5DFDCD76A6D980N.EXE 2572 A17D72233158EA870A5DFDCD76A6D980N.EXE 2572 A17D72233158EA870A5DFDCD76A6D980N.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2768 2704 a17d72233158ea870a5dfdcd76a6d980N.exe 31 PID 2704 wrote to memory of 2768 2704 a17d72233158ea870a5dfdcd76a6d980N.exe 31 PID 2704 wrote to memory of 2768 2704 a17d72233158ea870a5dfdcd76a6d980N.exe 31 PID 2704 wrote to memory of 2768 2704 a17d72233158ea870a5dfdcd76a6d980N.exe 31 PID 2704 wrote to memory of 2812 2704 a17d72233158ea870a5dfdcd76a6d980N.exe 32 PID 2704 wrote to memory of 2812 2704 a17d72233158ea870a5dfdcd76a6d980N.exe 32 PID 2704 wrote to memory of 2812 2704 a17d72233158ea870a5dfdcd76a6d980N.exe 32 PID 2704 wrote to memory of 2812 2704 a17d72233158ea870a5dfdcd76a6d980N.exe 32 PID 2812 wrote to memory of 2572 2812 MSWDM.EXE 33 PID 2812 wrote to memory of 2572 2812 MSWDM.EXE 33 PID 2812 wrote to memory of 2572 2812 MSWDM.EXE 33 PID 2812 wrote to memory of 2572 2812 MSWDM.EXE 33 PID 2812 wrote to memory of 2572 2812 MSWDM.EXE 33 PID 2812 wrote to memory of 2572 2812 MSWDM.EXE 33 PID 2812 wrote to memory of 2572 2812 MSWDM.EXE 33 PID 2812 wrote to memory of 2588 2812 MSWDM.EXE 34 PID 2812 wrote to memory of 2588 2812 MSWDM.EXE 34 PID 2812 wrote to memory of 2588 2812 MSWDM.EXE 34 PID 2812 wrote to memory of 2588 2812 MSWDM.EXE 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a17d72233158ea870a5dfdcd76a6d980N.exe"C:\Users\Admin\AppData\Local\Temp\a17d72233158ea870a5dfdcd76a6d980N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devE7EF.tmp!C:\Users\Admin\AppData\Local\Temp\a17d72233158ea870a5dfdcd76a6d980N.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\A17D72233158EA870A5DFDCD76A6D980N.EXE
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devE7EF.tmp!C:\Users\Admin\AppData\Local\Temp\A17D72233158EA870A5DFDCD76A6D980N.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD574e7cdde71339f09185445b7d2d8ca53
SHA1ac98ba8a9f5fdf097480e3802901ed8aee3635a3
SHA25697ed0604beccaed258e7485a08a9166048d637f3e10aae32cbe90ee22ee6d97c
SHA512e87ba7a34b258efdef4cd9058d67f1b83a4fcab92540b86f2acd32b3fa87f479f1dc601f7941469374991d385d5f58cf3aef566833007b9fcc15ded799ef174a
-
Filesize
80KB
MD53bad16e6b9791239f0136f664c22ace8
SHA1a92f82890a3ac797b3e5d51840be75376e751a0f
SHA2566b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17
SHA512ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd
-
Filesize
453KB
MD596f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149