Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-12-2020 15:58
Static task
static1
Behavioral task
behavioral1
Sample
b355dc0b186600b6812852aaba586ad3.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b355dc0b186600b6812852aaba586ad3.exe
Resource
win10v20201028
General
-
Target
b355dc0b186600b6812852aaba586ad3.exe
-
Size
14.9MB
-
MD5
b355dc0b186600b6812852aaba586ad3
-
SHA1
c4cfb0e6073a520bb06bf442b322a1cc3f30b8f5
-
SHA256
accf3e9fbd47c991968f035df3bfde01beddbb1dbcd667bd13dad9c52c18e17c
-
SHA512
67cc9bcd4ab5703d2be50986a875d412cb4446b5b277c32b596bc386d13eaa1b1ffb85cc4a85ff7d85d15c5dac4048823f011c6cb3586bfcfe390d3a78d73ef5
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
uqkqwyqh.exepid process 1316 uqkqwyqh.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2748 svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
uqkqwyqh.exedescription pid process target process PID 1316 set thread context of 2748 1316 uqkqwyqh.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
b355dc0b186600b6812852aaba586ad3.exeuqkqwyqh.exedescription pid process target process PID 4004 wrote to memory of 2244 4004 b355dc0b186600b6812852aaba586ad3.exe cmd.exe PID 4004 wrote to memory of 2244 4004 b355dc0b186600b6812852aaba586ad3.exe cmd.exe PID 4004 wrote to memory of 2244 4004 b355dc0b186600b6812852aaba586ad3.exe cmd.exe PID 4004 wrote to memory of 3084 4004 b355dc0b186600b6812852aaba586ad3.exe cmd.exe PID 4004 wrote to memory of 3084 4004 b355dc0b186600b6812852aaba586ad3.exe cmd.exe PID 4004 wrote to memory of 3084 4004 b355dc0b186600b6812852aaba586ad3.exe cmd.exe PID 4004 wrote to memory of 3856 4004 b355dc0b186600b6812852aaba586ad3.exe sc.exe PID 4004 wrote to memory of 3856 4004 b355dc0b186600b6812852aaba586ad3.exe sc.exe PID 4004 wrote to memory of 3856 4004 b355dc0b186600b6812852aaba586ad3.exe sc.exe PID 4004 wrote to memory of 1240 4004 b355dc0b186600b6812852aaba586ad3.exe sc.exe PID 4004 wrote to memory of 1240 4004 b355dc0b186600b6812852aaba586ad3.exe sc.exe PID 4004 wrote to memory of 1240 4004 b355dc0b186600b6812852aaba586ad3.exe sc.exe PID 4004 wrote to memory of 1956 4004 b355dc0b186600b6812852aaba586ad3.exe sc.exe PID 4004 wrote to memory of 1956 4004 b355dc0b186600b6812852aaba586ad3.exe sc.exe PID 4004 wrote to memory of 1956 4004 b355dc0b186600b6812852aaba586ad3.exe sc.exe PID 1316 wrote to memory of 2748 1316 uqkqwyqh.exe svchost.exe PID 1316 wrote to memory of 2748 1316 uqkqwyqh.exe svchost.exe PID 1316 wrote to memory of 2748 1316 uqkqwyqh.exe svchost.exe PID 1316 wrote to memory of 2748 1316 uqkqwyqh.exe svchost.exe PID 1316 wrote to memory of 2748 1316 uqkqwyqh.exe svchost.exe PID 4004 wrote to memory of 1128 4004 b355dc0b186600b6812852aaba586ad3.exe netsh.exe PID 4004 wrote to memory of 1128 4004 b355dc0b186600b6812852aaba586ad3.exe netsh.exe PID 4004 wrote to memory of 1128 4004 b355dc0b186600b6812852aaba586ad3.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b355dc0b186600b6812852aaba586ad3.exe"C:\Users\Admin\AppData\Local\Temp\b355dc0b186600b6812852aaba586ad3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nyxdnjbj\2⤵PID:2244
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\uqkqwyqh.exe" C:\Windows\SysWOW64\nyxdnjbj\2⤵PID:3084
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create nyxdnjbj binPath= "C:\Windows\SysWOW64\nyxdnjbj\uqkqwyqh.exe /d\"C:\Users\Admin\AppData\Local\Temp\b355dc0b186600b6812852aaba586ad3.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:3856
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description nyxdnjbj "wifi internet conection"2⤵PID:1240
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start nyxdnjbj2⤵PID:1956
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1128
-
C:\Windows\SysWOW64\nyxdnjbj\uqkqwyqh.exeC:\Windows\SysWOW64\nyxdnjbj\uqkqwyqh.exe /d"C:\Users\Admin\AppData\Local\Temp\b355dc0b186600b6812852aaba586ad3.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4cb1fef36fa507a127bc71fda343cb19
SHA1d811e61da57ca2c3de5c5b5d3921d47d10c47b5b
SHA256ce1c0011859c73317defb5f42bf65f33a579d80c991fe54fa851eef0cd7f185d
SHA51252acdec89d9b2b6e3e81f174dda8c812605ea7c8efb23c643a0537fa74ae84933cf7190fafd41122d5314dee1b3f249c1ff6ced8891eb066825ca0162df14308
-
MD5
4cb1fef36fa507a127bc71fda343cb19
SHA1d811e61da57ca2c3de5c5b5d3921d47d10c47b5b
SHA256ce1c0011859c73317defb5f42bf65f33a579d80c991fe54fa851eef0cd7f185d
SHA51252acdec89d9b2b6e3e81f174dda8c812605ea7c8efb23c643a0537fa74ae84933cf7190fafd41122d5314dee1b3f249c1ff6ced8891eb066825ca0162df14308