Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-12-2020 16:53
Static task
static1
Behavioral task
behavioral1
Sample
winserv.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
winserv.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
winserv.exe
-
Size
2.7MB
-
MD5
cf2ab077a46219b6ce4a53517dd489ea
-
SHA1
651b8d1377910e4728e85dcd231e269313ab9e1d
-
SHA256
609b0a416f9b16a6df9b967dc32cd739402af31566e019a8fb8abdf3cb573e30
-
SHA512
53fb1ac822467168ea8e7abdd72c78cdd90070b10773ce8c700c6784ab4cc3a03eb53887d158ce3a27779a5fbcf3300d2ccbedab79a34bfd42ddc91f68dbdad7
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 3612 created 2432 3612 svchost.exe winserv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
winserv.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation winserv.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
winserv.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@C:\Windows\SysWOW64\FirewallControlPanel.dll,-12122 = "Windows Firewall" winserv.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
winserv.exewinserv.exepid process 2432 winserv.exe 2432 winserv.exe 2432 winserv.exe 2432 winserv.exe 2432 winserv.exe 2432 winserv.exe 3252 winserv.exe 3252 winserv.exe 3252 winserv.exe 3252 winserv.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
winserv.exesvchost.exewinserv.exedescription pid process Token: SeDebugPrivilege 2432 winserv.exe Token: SeTcbPrivilege 3612 svchost.exe Token: SeTcbPrivilege 3612 svchost.exe Token: SeTakeOwnershipPrivilege 3252 winserv.exe Token: SeTcbPrivilege 3252 winserv.exe Token: SeTcbPrivilege 3252 winserv.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
winserv.exewinserv.exepid process 2432 winserv.exe 2432 winserv.exe 2432 winserv.exe 2432 winserv.exe 3252 winserv.exe 3252 winserv.exe 3252 winserv.exe 3252 winserv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
svchost.exedescription pid process target process PID 3612 wrote to memory of 3252 3612 svchost.exe winserv.exe PID 3612 wrote to memory of 3252 3612 svchost.exe winserv.exe PID 3612 wrote to memory of 3252 3612 svchost.exe winserv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\winserv.exe"C:\Users\Admin\AppData\Local\Temp\winserv.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\winserv.exeC:\Users\Admin\AppData\Local\Temp\winserv.exe -second2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3252
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3612