Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-12-2020 16:16
Static task
static1
Behavioral task
behavioral1
Sample
bafc60c6400d1952143edd3ca50ee960.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
bafc60c6400d1952143edd3ca50ee960.exe
Resource
win10v20201028
General
-
Target
bafc60c6400d1952143edd3ca50ee960.exe
-
Size
14.2MB
-
MD5
bafc60c6400d1952143edd3ca50ee960
-
SHA1
29e68429e3b2e5c80e8657f27cbd12873e17ce10
-
SHA256
53240ff0a9160c77159782458342eb971f6b6b0a8a94733f878a6fe90c1661c9
-
SHA512
047e8852afd1f3f6520c45a4cda89fab06d3c5f6436886b224a269d224844d4f473a739cf22b5a0a2f0008c2ef64aa46fd60347519a452ff5c83615e225a4c20
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
nlsonwul.exepid process 1148 nlsonwul.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 640 svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
nlsonwul.exedescription pid process target process PID 1148 set thread context of 640 1148 nlsonwul.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
bafc60c6400d1952143edd3ca50ee960.exenlsonwul.exedescription pid process target process PID 1036 wrote to memory of 2856 1036 bafc60c6400d1952143edd3ca50ee960.exe cmd.exe PID 1036 wrote to memory of 2856 1036 bafc60c6400d1952143edd3ca50ee960.exe cmd.exe PID 1036 wrote to memory of 2856 1036 bafc60c6400d1952143edd3ca50ee960.exe cmd.exe PID 1036 wrote to memory of 864 1036 bafc60c6400d1952143edd3ca50ee960.exe cmd.exe PID 1036 wrote to memory of 864 1036 bafc60c6400d1952143edd3ca50ee960.exe cmd.exe PID 1036 wrote to memory of 864 1036 bafc60c6400d1952143edd3ca50ee960.exe cmd.exe PID 1036 wrote to memory of 2692 1036 bafc60c6400d1952143edd3ca50ee960.exe sc.exe PID 1036 wrote to memory of 2692 1036 bafc60c6400d1952143edd3ca50ee960.exe sc.exe PID 1036 wrote to memory of 2692 1036 bafc60c6400d1952143edd3ca50ee960.exe sc.exe PID 1036 wrote to memory of 3180 1036 bafc60c6400d1952143edd3ca50ee960.exe sc.exe PID 1036 wrote to memory of 3180 1036 bafc60c6400d1952143edd3ca50ee960.exe sc.exe PID 1036 wrote to memory of 3180 1036 bafc60c6400d1952143edd3ca50ee960.exe sc.exe PID 1036 wrote to memory of 3704 1036 bafc60c6400d1952143edd3ca50ee960.exe sc.exe PID 1036 wrote to memory of 3704 1036 bafc60c6400d1952143edd3ca50ee960.exe sc.exe PID 1036 wrote to memory of 3704 1036 bafc60c6400d1952143edd3ca50ee960.exe sc.exe PID 1036 wrote to memory of 800 1036 bafc60c6400d1952143edd3ca50ee960.exe netsh.exe PID 1036 wrote to memory of 800 1036 bafc60c6400d1952143edd3ca50ee960.exe netsh.exe PID 1036 wrote to memory of 800 1036 bafc60c6400d1952143edd3ca50ee960.exe netsh.exe PID 1148 wrote to memory of 640 1148 nlsonwul.exe svchost.exe PID 1148 wrote to memory of 640 1148 nlsonwul.exe svchost.exe PID 1148 wrote to memory of 640 1148 nlsonwul.exe svchost.exe PID 1148 wrote to memory of 640 1148 nlsonwul.exe svchost.exe PID 1148 wrote to memory of 640 1148 nlsonwul.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bafc60c6400d1952143edd3ca50ee960.exe"C:\Users\Admin\AppData\Local\Temp\bafc60c6400d1952143edd3ca50ee960.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\avazaddr\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\nlsonwul.exe" C:\Windows\SysWOW64\avazaddr\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create avazaddr binPath= "C:\Windows\SysWOW64\avazaddr\nlsonwul.exe /d\"C:\Users\Admin\AppData\Local\Temp\bafc60c6400d1952143edd3ca50ee960.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description avazaddr "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start avazaddr2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Windows\SysWOW64\avazaddr\nlsonwul.exeC:\Windows\SysWOW64\avazaddr\nlsonwul.exe /d"C:\Users\Admin\AppData\Local\Temp\bafc60c6400d1952143edd3ca50ee960.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Drops file in System32 directory
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nlsonwul.exeMD5
3a42f54ab01cc30fedb5a074add447d8
SHA17054eef753989ef9799c1f5c7349b4a2454855d8
SHA2566097bde56b17efa7451cd6b4e2e1914f2fc425d4e2459fe0904284eaa2a0f78b
SHA51292a302e42f47d6dc04c7cebaa541b6a9c5fa589488814ff6867db4570f4ee5d34b21194f9f77f5e98b41b4172718c42b458eb678a6c27ddd37a8af64cfe214e7
-
C:\Windows\SysWOW64\avazaddr\nlsonwul.exeMD5
3a42f54ab01cc30fedb5a074add447d8
SHA17054eef753989ef9799c1f5c7349b4a2454855d8
SHA2566097bde56b17efa7451cd6b4e2e1914f2fc425d4e2459fe0904284eaa2a0f78b
SHA51292a302e42f47d6dc04c7cebaa541b6a9c5fa589488814ff6867db4570f4ee5d34b21194f9f77f5e98b41b4172718c42b458eb678a6c27ddd37a8af64cfe214e7
-
memory/640-10-0x0000000003020000-0x0000000003035000-memory.dmpFilesize
84KB
-
memory/640-11-0x0000000003029A6B-mapping.dmp
-
memory/640-12-0x0000000003020000-0x0000000003035000-memory.dmpFilesize
84KB
-
memory/800-9-0x0000000000000000-mapping.dmp
-
memory/864-3-0x0000000000000000-mapping.dmp
-
memory/2692-5-0x0000000000000000-mapping.dmp
-
memory/2856-2-0x0000000000000000-mapping.dmp
-
memory/3180-6-0x0000000000000000-mapping.dmp
-
memory/3704-7-0x0000000000000000-mapping.dmp