Analysis
-
max time kernel
149s -
max time network
78s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-11-2020 16:25
Static task
static1
Behavioral task
behavioral1
Sample
a.scr
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a.scr
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
a.scr
-
Size
15KB
-
MD5
ba74a7cb5a12d713229105df94a9e418
-
SHA1
c128af146a1f7ed27d702aa6ad7600d7ca3510cb
-
SHA256
1589137eea1bc46db43c9b9229402646773876d527585f68fd58d37add5d8402
-
SHA512
897c3906884ec1c836831308d023fc06e3b9aa92e8ef0fe8692d66f2965fce45d63eca2a936e5a6672a28fefa4b52ae0812eacfe3b27526509a19d105aba6eee
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 332 24857.exe 872 winsvcs.exe -
Loads dropped DLL 2 IoCs
pid Process 1936 a.scr 332 24857.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" winsvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winsvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winsvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winsvcs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\65971246227968\\winsvcs.exe" 24857.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\65971246227968\\winsvcs.exe" 24857.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1536 DllHost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1936 wrote to memory of 436 1936 a.scr 31 PID 1936 wrote to memory of 436 1936 a.scr 31 PID 1936 wrote to memory of 436 1936 a.scr 31 PID 1936 wrote to memory of 436 1936 a.scr 31 PID 1936 wrote to memory of 332 1936 a.scr 34 PID 1936 wrote to memory of 332 1936 a.scr 34 PID 1936 wrote to memory of 332 1936 a.scr 34 PID 1936 wrote to memory of 332 1936 a.scr 34 PID 332 wrote to memory of 872 332 24857.exe 35 PID 332 wrote to memory of 872 332 24857.exe 35 PID 332 wrote to memory of 872 332 24857.exe 35 PID 332 wrote to memory of 872 332 24857.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.scr"C:\Users\Admin\AppData\Local\Temp\a.scr" /S1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Users\Admin\AppData\Local\Temp\33427.jpg2⤵PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\24857.exeC:\Users\Admin\AppData\Local\Temp\24857.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:332 -
C:\65971246227968\winsvcs.exeC:\65971246227968\winsvcs.exe3⤵
- Executes dropped EXE
- Windows security modification
PID:872
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1536