Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-12-2020 13:52
Static task
static1
Behavioral task
behavioral1
Sample
1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe
Resource
win10v20201028
General
-
Target
1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe
-
Size
12.9MB
-
MD5
1fa3e0cc0442dbb6f0fcfe20ee1aba66
-
SHA1
423fbcc2ee9b37cb6878ce0a57f4d008b6d06ce5
-
SHA256
09e707025066b12df30cef409b036a8e74e9ef66c9ea1398bee9bdce3b4d0d1b
-
SHA512
447bb43df9d5dab44aba597de97889c15350a517fcef456d378347f77623043b9b215f3e022e97630b776d887e5c03a09b0d444d1d7d5a45bdb2b4f488477a95
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
dpqkfbcz.exepid process 2308 dpqkfbcz.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1380 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dpqkfbcz.exedescription pid process target process PID 2308 set thread context of 1380 2308 dpqkfbcz.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
1fa3e0cc0442dbb6f0fcfe20ee1aba66.exedpqkfbcz.exedescription pid process target process PID 652 wrote to memory of 4032 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe cmd.exe PID 652 wrote to memory of 4032 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe cmd.exe PID 652 wrote to memory of 4032 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe cmd.exe PID 652 wrote to memory of 3824 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe cmd.exe PID 652 wrote to memory of 3824 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe cmd.exe PID 652 wrote to memory of 3824 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe cmd.exe PID 652 wrote to memory of 560 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe sc.exe PID 652 wrote to memory of 560 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe sc.exe PID 652 wrote to memory of 560 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe sc.exe PID 652 wrote to memory of 192 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe sc.exe PID 652 wrote to memory of 192 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe sc.exe PID 652 wrote to memory of 192 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe sc.exe PID 652 wrote to memory of 636 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe sc.exe PID 652 wrote to memory of 636 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe sc.exe PID 652 wrote to memory of 636 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe sc.exe PID 2308 wrote to memory of 1380 2308 dpqkfbcz.exe svchost.exe PID 2308 wrote to memory of 1380 2308 dpqkfbcz.exe svchost.exe PID 2308 wrote to memory of 1380 2308 dpqkfbcz.exe svchost.exe PID 2308 wrote to memory of 1380 2308 dpqkfbcz.exe svchost.exe PID 2308 wrote to memory of 1380 2308 dpqkfbcz.exe svchost.exe PID 652 wrote to memory of 3948 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe netsh.exe PID 652 wrote to memory of 3948 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe netsh.exe PID 652 wrote to memory of 3948 652 1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe"C:\Users\Admin\AppData\Local\Temp\1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\iwhxkbqb\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dpqkfbcz.exe" C:\Windows\SysWOW64\iwhxkbqb\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create iwhxkbqb binPath= "C:\Windows\SysWOW64\iwhxkbqb\dpqkfbcz.exe /d\"C:\Users\Admin\AppData\Local\Temp\1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description iwhxkbqb "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start iwhxkbqb2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Windows\SysWOW64\iwhxkbqb\dpqkfbcz.exeC:\Windows\SysWOW64\iwhxkbqb\dpqkfbcz.exe /d"C:\Users\Admin\AppData\Local\Temp\1fa3e0cc0442dbb6f0fcfe20ee1aba66.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dpqkfbcz.exeMD5
23bb6bbac9b78d92dea6141177a310b1
SHA10aa41e2e63680d164ecf5535eef847019895f5b7
SHA2567f49800262b39066f174a97a8984c7b892812b6f1289956eec34215e7e908ce8
SHA5120c57f1afe554231bc277174dbaf62967ea04b384937a989fba9ebf4181f2727bf91884dc45f958373037dfefd37f810f51844014193c28f5659e6f4f9bc555a1
-
C:\Windows\SysWOW64\iwhxkbqb\dpqkfbcz.exeMD5
23bb6bbac9b78d92dea6141177a310b1
SHA10aa41e2e63680d164ecf5535eef847019895f5b7
SHA2567f49800262b39066f174a97a8984c7b892812b6f1289956eec34215e7e908ce8
SHA5120c57f1afe554231bc277174dbaf62967ea04b384937a989fba9ebf4181f2727bf91884dc45f958373037dfefd37f810f51844014193c28f5659e6f4f9bc555a1
-
memory/192-6-0x0000000000000000-mapping.dmp
-
memory/560-5-0x0000000000000000-mapping.dmp
-
memory/636-7-0x0000000000000000-mapping.dmp
-
memory/1380-9-0x0000000000DA0000-0x0000000000DB5000-memory.dmpFilesize
84KB
-
memory/1380-10-0x0000000000DA9A6B-mapping.dmp
-
memory/3824-3-0x0000000000000000-mapping.dmp
-
memory/3948-12-0x0000000000000000-mapping.dmp
-
memory/4032-2-0x0000000000000000-mapping.dmp