Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-12-2020 12:26
Static task
static1
Behavioral task
behavioral1
Sample
a2f750ea33e71a374a0e40cb66bad6cb.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
a2f750ea33e71a374a0e40cb66bad6cb.exe
Resource
win10v20201028
General
-
Target
a2f750ea33e71a374a0e40cb66bad6cb.exe
-
Size
10.7MB
-
MD5
a2f750ea33e71a374a0e40cb66bad6cb
-
SHA1
c13139c6d890e4c4fa7772751c4459a74f9ec382
-
SHA256
0f1625c8dfa3634a83f6a378fba14c07da2289d78881bc10b03ff06b87f3597d
-
SHA512
739f55776c23f55646261154873fc3c29ed53506e54703d2989ac796443b65947b197a71b7a21f273d2d81c299759d8247f3d2be9a58004e02aa02a8ddc66f80
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
edneywlx.exepid process 968 edneywlx.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1056 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
edneywlx.exedescription pid process target process PID 968 set thread context of 1056 968 edneywlx.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
a2f750ea33e71a374a0e40cb66bad6cb.exeedneywlx.exedescription pid process target process PID 1656 wrote to memory of 772 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe cmd.exe PID 1656 wrote to memory of 772 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe cmd.exe PID 1656 wrote to memory of 772 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe cmd.exe PID 1656 wrote to memory of 772 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe cmd.exe PID 1656 wrote to memory of 1744 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe cmd.exe PID 1656 wrote to memory of 1744 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe cmd.exe PID 1656 wrote to memory of 1744 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe cmd.exe PID 1656 wrote to memory of 1744 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe cmd.exe PID 1656 wrote to memory of 1368 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1368 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1368 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1368 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1636 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1636 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1636 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1636 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1572 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1572 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1572 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1572 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe sc.exe PID 1656 wrote to memory of 1100 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe netsh.exe PID 1656 wrote to memory of 1100 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe netsh.exe PID 1656 wrote to memory of 1100 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe netsh.exe PID 1656 wrote to memory of 1100 1656 a2f750ea33e71a374a0e40cb66bad6cb.exe netsh.exe PID 968 wrote to memory of 1056 968 edneywlx.exe svchost.exe PID 968 wrote to memory of 1056 968 edneywlx.exe svchost.exe PID 968 wrote to memory of 1056 968 edneywlx.exe svchost.exe PID 968 wrote to memory of 1056 968 edneywlx.exe svchost.exe PID 968 wrote to memory of 1056 968 edneywlx.exe svchost.exe PID 968 wrote to memory of 1056 968 edneywlx.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2f750ea33e71a374a0e40cb66bad6cb.exe"C:\Users\Admin\AppData\Local\Temp\a2f750ea33e71a374a0e40cb66bad6cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\dblmjljc\2⤵PID:772
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\edneywlx.exe" C:\Windows\SysWOW64\dblmjljc\2⤵PID:1744
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create dblmjljc binPath= "C:\Windows\SysWOW64\dblmjljc\edneywlx.exe /d\"C:\Users\Admin\AppData\Local\Temp\a2f750ea33e71a374a0e40cb66bad6cb.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1368
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description dblmjljc "wifi internet conection"2⤵PID:1636
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start dblmjljc2⤵PID:1572
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1100
-
C:\Windows\SysWOW64\dblmjljc\edneywlx.exeC:\Windows\SysWOW64\dblmjljc\edneywlx.exe /d"C:\Users\Admin\AppData\Local\Temp\a2f750ea33e71a374a0e40cb66bad6cb.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
PID:1056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a0fc0b8ee4cb52f4ed8952ac211c150d
SHA14f65823c822e1b3936fed47544a3f4f24cc673fa
SHA256964e6abe8e7f229118a4eedc2116e030bca365834e0639b00837fed7536ebb40
SHA512635e4165a5e227e61136ed8d5d814f0237be5963f75f34746af42e857ce3559702374f231adc654dee1d3747195ddc41862bfd0faf0b8b6c5a261d5af7806f3c
-
MD5
a0fc0b8ee4cb52f4ed8952ac211c150d
SHA14f65823c822e1b3936fed47544a3f4f24cc673fa
SHA256964e6abe8e7f229118a4eedc2116e030bca365834e0639b00837fed7536ebb40
SHA512635e4165a5e227e61136ed8d5d814f0237be5963f75f34746af42e857ce3559702374f231adc654dee1d3747195ddc41862bfd0faf0b8b6c5a261d5af7806f3c