Resubmissions
14/09/2024, 11:48
240914-nyqttssfrf 614/09/2024, 11:47
240914-nxz14ssfnh 614/09/2024, 11:42
240914-nt22assekg 6Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/09/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
services.exe
Resource
win11-20240802-en
General
-
Target
services.exe
-
Size
170KB
-
MD5
5e94401cb02b643606efa2343211f832
-
SHA1
27e71319f36ec75ba5705f27febfba6f94c06634
-
SHA256
7b3501b29fad54316a48c7cbe034f6f97593ef80e262a127c24094ba1cde7f9f
-
SHA512
884f3d72a662f486c5fbd8f494689650011701faf9ef78fe77dfd9533cd3ddd9f37cac310b156a8bac7bb99ffe7aebe0df973df0281e9ce7f4c03369f614bfc4
-
SSDEEP
3072:bahKyd2n31F5GWp1icKAArDZz4N9GhbkrNEk+5fJ3qa1+YhWxLzF:bahOxp0yN90QEgP
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" services.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3860 wrote to memory of 2776 3860 services.exe 78 PID 3860 wrote to memory of 2776 3860 services.exe 78 PID 2776 wrote to memory of 5828 2776 cmd.exe 80 PID 2776 wrote to memory of 5828 2776 cmd.exe 80 PID 2776 wrote to memory of 4228 2776 cmd.exe 81 PID 2776 wrote to memory of 4228 2776 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\services.exe"C:\Users\Admin\AppData\Local\Temp\services.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SYSTEM32\cmd.execmd /c "services.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:5828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo Admin3⤵PID:4228
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD50a214e3b578b2aea45b48dfe3cf2d327
SHA1a1100fe27b3397bbdc6871a7a2c5e310a098a448
SHA25687d8a4024642f8231333c35e0c792d1192024f7305093589cf65639b2573e6e7
SHA512239ccc51e0bdec7a7e8d727b960d4eb9f3e7b07703b6600d5712dca95786fe0fa12ce9041ac7f59aeae646b57b641b95c9bfc966491a4385f88e8e8f13ea6569