Analysis
-
max time kernel
15s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31/08/2024, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
22ccce62af23834844739a655d626ab0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
22ccce62af23834844739a655d626ab0N.exe
Resource
win10v2004-20240802-en
General
-
Target
22ccce62af23834844739a655d626ab0N.exe
-
Size
895KB
-
MD5
22ccce62af23834844739a655d626ab0
-
SHA1
0378126d47b501ff0e831eb556e9fd52d68fb96f
-
SHA256
c750dc34afcb0465976217f9257a3141981bf58750fb2052238ba60efda8041e
-
SHA512
bb321accfbaf7ea12c56dfd0e73af1e747f61b58c854d11468b20b181961c2c28dccfacfed87eb28cba625cfd850e5632b2849125889cc7a38d0eac7f1688479
-
SSDEEP
24576:WbX+3Ze0p4Ek4niOkl/A04szE87JKTvmN:WbX+JeW4SkZP4sz9Mbm
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2068 MSWDM.EXE 2144 MSWDM.EXE 2404 22CCCE62AF23834844739A655D626AB0N.EXE -
Loads dropped DLL 2 IoCs
pid Process 2068 MSWDM.EXE 2068 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 22ccce62af23834844739a655d626ab0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 22ccce62af23834844739a655d626ab0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 22ccce62af23834844739a655d626ab0N.exe File opened for modification C:\Windows\dev9CCC.tmp 22ccce62af23834844739a655d626ab0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22ccce62af23834844739a655d626ab0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2068 MSWDM.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 22CCCE62AF23834844739A655D626AB0N.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2404 22CCCE62AF23834844739A655D626AB0N.EXE Token: 35 2404 22CCCE62AF23834844739A655D626AB0N.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2144 2572 22ccce62af23834844739a655d626ab0N.exe 30 PID 2572 wrote to memory of 2144 2572 22ccce62af23834844739a655d626ab0N.exe 30 PID 2572 wrote to memory of 2144 2572 22ccce62af23834844739a655d626ab0N.exe 30 PID 2572 wrote to memory of 2144 2572 22ccce62af23834844739a655d626ab0N.exe 30 PID 2572 wrote to memory of 2068 2572 22ccce62af23834844739a655d626ab0N.exe 31 PID 2572 wrote to memory of 2068 2572 22ccce62af23834844739a655d626ab0N.exe 31 PID 2572 wrote to memory of 2068 2572 22ccce62af23834844739a655d626ab0N.exe 31 PID 2572 wrote to memory of 2068 2572 22ccce62af23834844739a655d626ab0N.exe 31 PID 2068 wrote to memory of 2404 2068 MSWDM.EXE 32 PID 2068 wrote to memory of 2404 2068 MSWDM.EXE 32 PID 2068 wrote to memory of 2404 2068 MSWDM.EXE 32 PID 2068 wrote to memory of 2404 2068 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\22ccce62af23834844739a655d626ab0N.exe"C:\Users\Admin\AppData\Local\Temp\22ccce62af23834844739a655d626ab0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev9CCC.tmp!C:\Users\Admin\AppData\Local\Temp\22ccce62af23834844739a655d626ab0N.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\22CCCE62AF23834844739A655D626AB0N.EXE
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5336ffd74e5eb29bc13e4e0f5de0cb57a
SHA1fb3bab77482267f8880cd329d926a41d397d072d
SHA256688c0c407e9651d4fb63017475f3ca304c7ff8c0185592c3a1d7d3b660098c79
SHA512e8e70882eebbb5a602ac68a4a51a15c7d32d083b5c5717981a9b33d358e17411a0fee1294b631f29f0f5cf06e0ad86109198de6114ba364fdaac1e866a049d76
-
Filesize
847KB
MD5c8f40f25f783a52262bdaedeb5555427
SHA1e45e198607c8d7398745baa71780e3e7a2f6deca
SHA256e81b44ee7381ae3b630488b6fb7e3d9ffbdd9ac3032181d4ccaaff3409b57316
SHA512f5944743f54028eb1dd0f2d68468726b177d33185324da0da96cdd20768bab4ca2e507ae9157b2733fd6240c920b7e15a5f5b9f284ee09d0fd385fc895b97191