Analysis
-
max time kernel
110s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
3c446290d6fc0a1e0bb0abe68033e070N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c446290d6fc0a1e0bb0abe68033e070N.exe
Resource
win10v2004-20240802-en
General
-
Target
3c446290d6fc0a1e0bb0abe68033e070N.exe
-
Size
74KB
-
MD5
3c446290d6fc0a1e0bb0abe68033e070
-
SHA1
a13dc12dcbddb7081cb5a55cbbddaf77f89f4dd2
-
SHA256
1228fba822a3d86c342197d110d46c6c8a3104d69f577799141255016689cdc8
-
SHA512
1000da0f248a5a8501101658b0814c410446890c9f72609729ac82d8962ecdafe0caef651c59deae11775e1dfd23a66749b85277fcc43864f2a12fd49b938f13
-
SSDEEP
1536:3Iq4Ts+P6Y8pEcUo50ACBDzvpjK+SVlAWaYFUIt/Q:QTVP6Y8pfU3DBD6VW1tIt/Q
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe SMSSwj.exe" 3c446290d6fc0a1e0bb0abe68033e070N.exe -
Executes dropped EXE 1 IoCs
pid Process 436 SMSSwj.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Service Host = "C:\\Windows\\svchost.exe" 3c446290d6fc0a1e0bb0abe68033e070N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Service Host = "C:\\Windows\\SMSSwj.exe" 3c446290d6fc0a1e0bb0abe68033e070N.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File created C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Cultures 3 Northland Crack.exe SMSSwj.exe File created C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Zone Alarm Pro 4.0 Crack.exe SMSSwj.exe File created C:\Windows\svchost.exe 3c446290d6fc0a1e0bb0abe68033e070N.exe File created C:\Windows\SMSSwj.exe SMSSwj.exe File created C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D}\BearShare Pro v4.0.1 Crack.exe SMSSwj.exe File opened for modification C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D}\DVD X Studios CloneDVD 1.25 Crack.exe SMSSwj.exe File created C:\Windows\SMSSwj.exe 3c446290d6fc0a1e0bb0abe68033e070N.exe File opened for modification C:\Windows\svchost.exe SMSSwj.exe File opened for modification C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D}\BearShare Pro v4.0.1 Crack.exe SMSSwj.exe File opened for modification C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Cultures 3 Northland Crack.exe SMSSwj.exe File created C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D}\DivX Pro 5.1 Crack.exe SMSSwj.exe File opened for modification C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Zone Alarm Pro 4.0 Crack.exe SMSSwj.exe File opened for modification C:\Windows\SMSSwj.exe 3c446290d6fc0a1e0bb0abe68033e070N.exe File opened for modification C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D} SMSSwj.exe File created C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D}\DVD X Studios CloneDVD 1.25 Crack.exe SMSSwj.exe File opened for modification C:\Windows\mstorvil.{21EC2020-3AEA-1069-A2DD-08002B30309D}\DivX Pro 5.1 Crack.exe SMSSwj.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c446290d6fc0a1e0bb0abe68033e070N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSSwj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5008 wrote to memory of 436 5008 3c446290d6fc0a1e0bb0abe68033e070N.exe 83 PID 5008 wrote to memory of 436 5008 3c446290d6fc0a1e0bb0abe68033e070N.exe 83 PID 5008 wrote to memory of 436 5008 3c446290d6fc0a1e0bb0abe68033e070N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c446290d6fc0a1e0bb0abe68033e070N.exe"C:\Users\Admin\AppData\Local\Temp\3c446290d6fc0a1e0bb0abe68033e070N.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SMSSwj.exeC:\Windows\SMSSwj.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD53c446290d6fc0a1e0bb0abe68033e070
SHA1a13dc12dcbddb7081cb5a55cbbddaf77f89f4dd2
SHA2561228fba822a3d86c342197d110d46c6c8a3104d69f577799141255016689cdc8
SHA5121000da0f248a5a8501101658b0814c410446890c9f72609729ac82d8962ecdafe0caef651c59deae11775e1dfd23a66749b85277fcc43864f2a12fd49b938f13
-
Filesize
74KB
MD5eaf5c6704d475d5b998e9e51467a2a5d
SHA1a04b1ed93d7002b4cd94c07a3b6a7af3568e71d9
SHA256035af224dfd2feea81c3f9cf020a8140f2b96d7231402bececcaf71ef6e28810
SHA51207958bc8d870320833cf2e80f7bf6c2869142a51c900b4fcda137b0d200a166dc67feefd0ca2aea3d75ad72369860060963544091f17a8624ef551b0f89b5d05