Analysis
-
max time kernel
161s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 00:47
Behavioral task
behavioral1
Sample
22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe
Resource
win10v2004-20240704-en
General
-
Target
22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe
-
Size
45KB
-
MD5
20e7e84ffe49f34407c2f114bdc4fc50
-
SHA1
e587a55f005e6202ddd066c0fe607c2204a4cfac
-
SHA256
22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237
-
SHA512
847097e24f752c8db524dafd9a55b126d6b8b77cb8309160935bb7b33eb89da563f3cc838fe89fb5960c0facd2e1f0b749b4813e8d7fd1cc7e7c68186d3a321b
-
SSDEEP
768:phP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:zsWE9N5dFu53dsniQaB/xZ14n7zIF+qr
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2224-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\1F0BB8C6 = "C:\\Users\\Admin\\AppData\\Roaming\\1F0BB8C6\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 2264 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exewinver.exedescription pid process target process PID 2224 wrote to memory of 2264 2224 22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe winver.exe PID 2224 wrote to memory of 2264 2224 22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe winver.exe PID 2224 wrote to memory of 2264 2224 22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe winver.exe PID 2224 wrote to memory of 2264 2224 22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe winver.exe PID 2224 wrote to memory of 2264 2224 22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe winver.exe PID 2264 wrote to memory of 1252 2264 winver.exe Explorer.EXE PID 2264 wrote to memory of 1116 2264 winver.exe taskhost.exe PID 2264 wrote to memory of 1204 2264 winver.exe Dwm.exe PID 2264 wrote to memory of 1252 2264 winver.exe Explorer.EXE PID 2264 wrote to memory of 932 2264 winver.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe"C:\Users\Admin\AppData\Local\Temp\22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/932-25-0x0000000001CD0000-0x0000000001CD6000-memory.dmpFilesize
24KB
-
memory/932-26-0x0000000001CD0000-0x0000000001CD6000-memory.dmpFilesize
24KB
-
memory/932-27-0x00000000779F1000-0x00000000779F2000-memory.dmpFilesize
4KB
-
memory/1116-19-0x00000000006A0000-0x00000000006A6000-memory.dmpFilesize
24KB
-
memory/1116-20-0x00000000779F1000-0x00000000779F2000-memory.dmpFilesize
4KB
-
memory/1204-21-0x0000000000130000-0x0000000000136000-memory.dmpFilesize
24KB
-
memory/1204-16-0x0000000000130000-0x0000000000136000-memory.dmpFilesize
24KB
-
memory/1252-18-0x00000000025D0000-0x00000000025D6000-memory.dmpFilesize
24KB
-
memory/1252-22-0x00000000025D0000-0x00000000025D6000-memory.dmpFilesize
24KB
-
memory/1252-3-0x0000000002200000-0x0000000002206000-memory.dmpFilesize
24KB
-
memory/1252-2-0x0000000002200000-0x0000000002206000-memory.dmpFilesize
24KB
-
memory/1252-4-0x0000000002200000-0x0000000002206000-memory.dmpFilesize
24KB
-
memory/1252-7-0x00000000779F1000-0x00000000779F2000-memory.dmpFilesize
4KB
-
memory/2224-9-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/2224-0-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/2224-1-0x00000000002E0000-0x00000000002F6000-memory.dmpFilesize
88KB
-
memory/2264-11-0x0000000000090000-0x0000000000096000-memory.dmpFilesize
24KB
-
memory/2264-12-0x00000000779A0000-0x0000000077B49000-memory.dmpFilesize
1.7MB
-
memory/2264-5-0x00000000003F1000-0x00000000003F2000-memory.dmpFilesize
4KB
-
memory/2264-6-0x00000000003F0000-0x0000000000406000-memory.dmpFilesize
88KB