Analysis
-
max time kernel
146s -
max time network
187s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-07-2021 21:08
Static task
static1
Behavioral task
behavioral1
Sample
TRwrC.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
TRwrC.exe
-
Size
202KB
-
MD5
eaa9755979d4edeac9c48ffb1f42551c
-
SHA1
0ba5fc95f551f89648e0ddae327e60ffa417712f
-
SHA256
6f6d5cffc1e927811613347c2c10f9071434fedde5780114089981e494b573a7
-
SHA512
37fc60d70c6e573ef2ff1cbdc984614e6ececbee34966fb11d21703b222a3d32d64f2d519b4617c2c33ab5ad81a60fcf65e8d39ab62c145a070657d94918beda
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
TRwrC.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Service = "C:\\Program Files (x86)\\DPI Service\\dpisv.exe" TRwrC.exe -
Processes:
TRwrC.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TRwrC.exe -
Drops file in Program Files directory 2 IoCs
Processes:
TRwrC.exedescription ioc process File created C:\Program Files (x86)\DPI Service\dpisv.exe TRwrC.exe File opened for modification C:\Program Files (x86)\DPI Service\dpisv.exe TRwrC.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
TRwrC.exepid process 760 TRwrC.exe 760 TRwrC.exe 760 TRwrC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
TRwrC.exepid process 760 TRwrC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
TRwrC.exedescription pid process Token: SeDebugPrivilege 760 TRwrC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TRwrC.exe"C:\Users\Admin\AppData\Local\Temp\TRwrC.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:760