Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-12-2020 13:30
Static task
static1
Behavioral task
behavioral1
Sample
0886900e6ab222d3c07748d15656ac31.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0886900e6ab222d3c07748d15656ac31.exe
Resource
win10v20201028
General
-
Target
0886900e6ab222d3c07748d15656ac31.exe
-
Size
10.6MB
-
MD5
0886900e6ab222d3c07748d15656ac31
-
SHA1
09d03036d44c671692f1127c9f5b4a0d402b3774
-
SHA256
d3a5a7bd70448e907398655362e916a9de3c8e80f9af2582e6bacdb01b0b502a
-
SHA512
6520f0aa808539930f88c8f1f372f46de75c8ec12cee9774cbe3f885c78fe98a8c6a2c07171bb5d6aecef620e34fc9ef90e23451c166f7f7753107e914adb55f
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
jatwdqcb.exepid process 868 jatwdqcb.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1516 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
jatwdqcb.exedescription pid process target process PID 868 set thread context of 1516 868 jatwdqcb.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
0886900e6ab222d3c07748d15656ac31.exejatwdqcb.exedescription pid process target process PID 1208 wrote to memory of 1148 1208 0886900e6ab222d3c07748d15656ac31.exe cmd.exe PID 1208 wrote to memory of 1148 1208 0886900e6ab222d3c07748d15656ac31.exe cmd.exe PID 1208 wrote to memory of 1148 1208 0886900e6ab222d3c07748d15656ac31.exe cmd.exe PID 1208 wrote to memory of 1148 1208 0886900e6ab222d3c07748d15656ac31.exe cmd.exe PID 1208 wrote to memory of 1964 1208 0886900e6ab222d3c07748d15656ac31.exe cmd.exe PID 1208 wrote to memory of 1964 1208 0886900e6ab222d3c07748d15656ac31.exe cmd.exe PID 1208 wrote to memory of 1964 1208 0886900e6ab222d3c07748d15656ac31.exe cmd.exe PID 1208 wrote to memory of 1964 1208 0886900e6ab222d3c07748d15656ac31.exe cmd.exe PID 1208 wrote to memory of 1756 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1756 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1756 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1756 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1352 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1352 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1352 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1352 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1400 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1400 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1400 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1400 1208 0886900e6ab222d3c07748d15656ac31.exe sc.exe PID 1208 wrote to memory of 1884 1208 0886900e6ab222d3c07748d15656ac31.exe netsh.exe PID 1208 wrote to memory of 1884 1208 0886900e6ab222d3c07748d15656ac31.exe netsh.exe PID 1208 wrote to memory of 1884 1208 0886900e6ab222d3c07748d15656ac31.exe netsh.exe PID 1208 wrote to memory of 1884 1208 0886900e6ab222d3c07748d15656ac31.exe netsh.exe PID 868 wrote to memory of 1516 868 jatwdqcb.exe svchost.exe PID 868 wrote to memory of 1516 868 jatwdqcb.exe svchost.exe PID 868 wrote to memory of 1516 868 jatwdqcb.exe svchost.exe PID 868 wrote to memory of 1516 868 jatwdqcb.exe svchost.exe PID 868 wrote to memory of 1516 868 jatwdqcb.exe svchost.exe PID 868 wrote to memory of 1516 868 jatwdqcb.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0886900e6ab222d3c07748d15656ac31.exe"C:\Users\Admin\AppData\Local\Temp\0886900e6ab222d3c07748d15656ac31.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\driilcwr\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jatwdqcb.exe" C:\Windows\SysWOW64\driilcwr\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create driilcwr binPath= "C:\Windows\SysWOW64\driilcwr\jatwdqcb.exe /d\"C:\Users\Admin\AppData\Local\Temp\0886900e6ab222d3c07748d15656ac31.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description driilcwr "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start driilcwr2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Windows\SysWOW64\driilcwr\jatwdqcb.exeC:\Windows\SysWOW64\driilcwr\jatwdqcb.exe /d"C:\Users\Admin\AppData\Local\Temp\0886900e6ab222d3c07748d15656ac31.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\jatwdqcb.exeMD5
9f3d5a58ded585b7eb69472e0b4b3cb3
SHA1763d72bca80e9c09d9d2031d863b42612f72b478
SHA256655beaf4a72c4058c9b0f30697553a14be6f18b7eb94ed64515a4162f5a92ebb
SHA512451b1fd5640334545f30dafb538df4312fd9222338f64b218df0127913db2566d3da6eb5035eae64fe83cace35eb2d8adc46b85d4619ab9db2a1f1d4a1af8a06
-
C:\Windows\SysWOW64\driilcwr\jatwdqcb.exeMD5
9f3d5a58ded585b7eb69472e0b4b3cb3
SHA1763d72bca80e9c09d9d2031d863b42612f72b478
SHA256655beaf4a72c4058c9b0f30697553a14be6f18b7eb94ed64515a4162f5a92ebb
SHA512451b1fd5640334545f30dafb538df4312fd9222338f64b218df0127913db2566d3da6eb5035eae64fe83cace35eb2d8adc46b85d4619ab9db2a1f1d4a1af8a06
-
memory/1148-2-0x0000000000000000-mapping.dmp
-
memory/1352-6-0x0000000000000000-mapping.dmp
-
memory/1400-7-0x0000000000000000-mapping.dmp
-
memory/1516-10-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/1516-11-0x0000000000089A6B-mapping.dmp
-
memory/1756-5-0x0000000000000000-mapping.dmp
-
memory/1884-8-0x0000000000000000-mapping.dmp
-
memory/1964-3-0x0000000000000000-mapping.dmp