Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-12-2020 14:31
Static task
static1
Behavioral task
behavioral1
Sample
4ac2eac8e4dac3288be47509a33c4a67.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4ac2eac8e4dac3288be47509a33c4a67.exe
Resource
win10v20201028
General
-
Target
4ac2eac8e4dac3288be47509a33c4a67.exe
-
Size
10.4MB
-
MD5
4ac2eac8e4dac3288be47509a33c4a67
-
SHA1
b1fa98d1320a6c2d5ccc799dad147b4272f9825a
-
SHA256
3d8efe324e234ca7b31ec46dae3e9fe5c98da16bfcf5cd0b43585ef2b00de606
-
SHA512
5540a97eea6b3ea877623d1358761cd8b1a2467a9c559bd3aed4fd503db4281699acbd7e31c13da31c11ec48b335873513686b3bb41d38572218bc87a65c6790
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
lkulfdse.exepid process 1208 lkulfdse.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 472 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
lkulfdse.exedescription pid process target process PID 1208 set thread context of 472 1208 lkulfdse.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
4ac2eac8e4dac3288be47509a33c4a67.exelkulfdse.exedescription pid process target process PID 932 wrote to memory of 2032 932 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 932 wrote to memory of 2032 932 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 932 wrote to memory of 2032 932 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 932 wrote to memory of 2032 932 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 932 wrote to memory of 1740 932 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 932 wrote to memory of 1740 932 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 932 wrote to memory of 1740 932 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 932 wrote to memory of 1740 932 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 932 wrote to memory of 1484 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1484 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1484 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1484 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1292 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1292 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1292 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1292 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1336 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1336 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1336 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 1336 932 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 932 wrote to memory of 776 932 4ac2eac8e4dac3288be47509a33c4a67.exe netsh.exe PID 932 wrote to memory of 776 932 4ac2eac8e4dac3288be47509a33c4a67.exe netsh.exe PID 932 wrote to memory of 776 932 4ac2eac8e4dac3288be47509a33c4a67.exe netsh.exe PID 932 wrote to memory of 776 932 4ac2eac8e4dac3288be47509a33c4a67.exe netsh.exe PID 1208 wrote to memory of 472 1208 lkulfdse.exe svchost.exe PID 1208 wrote to memory of 472 1208 lkulfdse.exe svchost.exe PID 1208 wrote to memory of 472 1208 lkulfdse.exe svchost.exe PID 1208 wrote to memory of 472 1208 lkulfdse.exe svchost.exe PID 1208 wrote to memory of 472 1208 lkulfdse.exe svchost.exe PID 1208 wrote to memory of 472 1208 lkulfdse.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ac2eac8e4dac3288be47509a33c4a67.exe"C:\Users\Admin\AppData\Local\Temp\4ac2eac8e4dac3288be47509a33c4a67.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\kppdytdz\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\lkulfdse.exe" C:\Windows\SysWOW64\kppdytdz\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create kppdytdz binPath= "C:\Windows\SysWOW64\kppdytdz\lkulfdse.exe /d\"C:\Users\Admin\AppData\Local\Temp\4ac2eac8e4dac3288be47509a33c4a67.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description kppdytdz "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start kppdytdz2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Windows\SysWOW64\kppdytdz\lkulfdse.exeC:\Windows\SysWOW64\kppdytdz\lkulfdse.exe /d"C:\Users\Admin\AppData\Local\Temp\4ac2eac8e4dac3288be47509a33c4a67.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\lkulfdse.exeMD5
8f6a11b086afe1f5fbe2c0cb6b72df62
SHA12c92b5871fe6a4a255706daa4d6549c600912dda
SHA2562e8b150701d4a75d860734c210675a76a99a2405970cb6f98c6c84ba6b0fe07d
SHA5124a6a6f0c917bc008657ea3ae7c8c7e8e223efe12ca8649173dc5e50db206be98dcc3908171ca8b52c6b32aa455e4bc21be24da94d533eb7674752df1255f5ea3
-
C:\Windows\SysWOW64\kppdytdz\lkulfdse.exeMD5
8f6a11b086afe1f5fbe2c0cb6b72df62
SHA12c92b5871fe6a4a255706daa4d6549c600912dda
SHA2562e8b150701d4a75d860734c210675a76a99a2405970cb6f98c6c84ba6b0fe07d
SHA5124a6a6f0c917bc008657ea3ae7c8c7e8e223efe12ca8649173dc5e50db206be98dcc3908171ca8b52c6b32aa455e4bc21be24da94d533eb7674752df1255f5ea3
-
memory/472-10-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/472-11-0x0000000000089A6B-mapping.dmp
-
memory/472-12-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/776-8-0x0000000000000000-mapping.dmp
-
memory/1292-6-0x0000000000000000-mapping.dmp
-
memory/1336-7-0x0000000000000000-mapping.dmp
-
memory/1484-5-0x0000000000000000-mapping.dmp
-
memory/1740-3-0x0000000000000000-mapping.dmp
-
memory/2032-2-0x0000000000000000-mapping.dmp