Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-12-2020 14:31
Static task
static1
Behavioral task
behavioral1
Sample
4ac2eac8e4dac3288be47509a33c4a67.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4ac2eac8e4dac3288be47509a33c4a67.exe
Resource
win10v20201028
General
-
Target
4ac2eac8e4dac3288be47509a33c4a67.exe
-
Size
10.4MB
-
MD5
4ac2eac8e4dac3288be47509a33c4a67
-
SHA1
b1fa98d1320a6c2d5ccc799dad147b4272f9825a
-
SHA256
3d8efe324e234ca7b31ec46dae3e9fe5c98da16bfcf5cd0b43585ef2b00de606
-
SHA512
5540a97eea6b3ea877623d1358761cd8b1a2467a9c559bd3aed4fd503db4281699acbd7e31c13da31c11ec48b335873513686b3bb41d38572218bc87a65c6790
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
pkoqtcbn.exepid process 1576 pkoqtcbn.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 3904 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
pkoqtcbn.exedescription pid process target process PID 1576 set thread context of 3904 1576 pkoqtcbn.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
4ac2eac8e4dac3288be47509a33c4a67.exepkoqtcbn.exedescription pid process target process PID 984 wrote to memory of 1864 984 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 984 wrote to memory of 1864 984 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 984 wrote to memory of 1864 984 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 984 wrote to memory of 2696 984 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 984 wrote to memory of 2696 984 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 984 wrote to memory of 2696 984 4ac2eac8e4dac3288be47509a33c4a67.exe cmd.exe PID 984 wrote to memory of 3976 984 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 984 wrote to memory of 3976 984 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 984 wrote to memory of 3976 984 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 984 wrote to memory of 200 984 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 984 wrote to memory of 200 984 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 984 wrote to memory of 200 984 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 984 wrote to memory of 3512 984 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 984 wrote to memory of 3512 984 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 984 wrote to memory of 3512 984 4ac2eac8e4dac3288be47509a33c4a67.exe sc.exe PID 1576 wrote to memory of 3904 1576 pkoqtcbn.exe svchost.exe PID 1576 wrote to memory of 3904 1576 pkoqtcbn.exe svchost.exe PID 1576 wrote to memory of 3904 1576 pkoqtcbn.exe svchost.exe PID 1576 wrote to memory of 3904 1576 pkoqtcbn.exe svchost.exe PID 1576 wrote to memory of 3904 1576 pkoqtcbn.exe svchost.exe PID 984 wrote to memory of 2056 984 4ac2eac8e4dac3288be47509a33c4a67.exe netsh.exe PID 984 wrote to memory of 2056 984 4ac2eac8e4dac3288be47509a33c4a67.exe netsh.exe PID 984 wrote to memory of 2056 984 4ac2eac8e4dac3288be47509a33c4a67.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ac2eac8e4dac3288be47509a33c4a67.exe"C:\Users\Admin\AppData\Local\Temp\4ac2eac8e4dac3288be47509a33c4a67.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wfmikvck\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pkoqtcbn.exe" C:\Windows\SysWOW64\wfmikvck\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create wfmikvck binPath= "C:\Windows\SysWOW64\wfmikvck\pkoqtcbn.exe /d\"C:\Users\Admin\AppData\Local\Temp\4ac2eac8e4dac3288be47509a33c4a67.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description wfmikvck "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wfmikvck2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Windows\SysWOW64\wfmikvck\pkoqtcbn.exeC:\Windows\SysWOW64\wfmikvck\pkoqtcbn.exe /d"C:\Users\Admin\AppData\Local\Temp\4ac2eac8e4dac3288be47509a33c4a67.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\pkoqtcbn.exeMD5
13aa6e16118572c60f68260a358a8c56
SHA135d8d8df2da6124afdfe6539ce8c820777c6f57b
SHA256991f3f45839ba20c9fdbfc0bbbe4405df794bd6c3ee43453875ccd3883fe2d71
SHA512808a7a6b9fd4ce09d38bd5622e5c19c5824032a55a4e195ca870cb12d5bbe9338c289873fa69a87ffec7139b130481cea8c5544bed1c428c7c05814dba26530b
-
C:\Windows\SysWOW64\wfmikvck\pkoqtcbn.exeMD5
13aa6e16118572c60f68260a358a8c56
SHA135d8d8df2da6124afdfe6539ce8c820777c6f57b
SHA256991f3f45839ba20c9fdbfc0bbbe4405df794bd6c3ee43453875ccd3883fe2d71
SHA512808a7a6b9fd4ce09d38bd5622e5c19c5824032a55a4e195ca870cb12d5bbe9338c289873fa69a87ffec7139b130481cea8c5544bed1c428c7c05814dba26530b
-
memory/200-6-0x0000000000000000-mapping.dmp
-
memory/1864-2-0x0000000000000000-mapping.dmp
-
memory/2056-12-0x0000000000000000-mapping.dmp
-
memory/2696-3-0x0000000000000000-mapping.dmp
-
memory/3512-7-0x0000000000000000-mapping.dmp
-
memory/3904-10-0x0000000000559A6B-mapping.dmp
-
memory/3904-9-0x0000000000550000-0x0000000000565000-memory.dmpFilesize
84KB
-
memory/3976-5-0x0000000000000000-mapping.dmp