Analysis
-
max time kernel
4294211s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
14-03-2022 05:13
Static task
static1
Behavioral task
behavioral1
Sample
SHITYOURSELF.exe
Resource
win7-20220311-en
General
-
Target
SHITYOURSELF.exe
-
Size
121KB
-
MD5
c497c71621630045eb8d0673ae817d70
-
SHA1
74c6e0b93f8c6d5d5634bf32a47a6c4968fefc01
-
SHA256
b8e40ed3d1f01fd75f0f43d4784d92aaa9596f289f23c35969af1a4c1e149c30
-
SHA512
73a8f54b95ccdfaa5f2e42dca771687612e514de87904840f4eac5fc87f0262051e614c0b0f4d576fe99f58b421dc106f45fe3bea011e0eb8bdc2d99e92f6463
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
SHITYOURSELFSrv.exepid process 1616 SHITYOURSELFSrv.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SHITYOURSELFSrv.exe upx C:\Users\Admin\AppData\Local\Temp\SHITYOURSELFSrv.exe upx C:\Users\Admin\AppData\Local\Temp\SHITYOURSELFSrv.exe upx behavioral1/memory/1616-60-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
SHITYOURSELF.exepid process 1564 SHITYOURSELF.exe -
Drops file in Program Files directory 3 IoCs
Processes:
SHITYOURSELFSrv.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\px3D9C.tmp SHITYOURSELFSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe SHITYOURSELFSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe SHITYOURSELFSrv.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SHITYOURSELF.exepid process 1564 SHITYOURSELF.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
Processes:
SHITYOURSELF.exepid process 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe 1564 SHITYOURSELF.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
SHITYOURSELF.exedescription pid process Token: SeDebugPrivilege 1564 SHITYOURSELF.exe Token: SeTakeOwnershipPrivilege 1564 SHITYOURSELF.exe Token: SeRestorePrivilege 1564 SHITYOURSELF.exe Token: SeBackupPrivilege 1564 SHITYOURSELF.exe Token: SeChangeNotifyPrivilege 1564 SHITYOURSELF.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SHITYOURSELF.exedescription pid process target process PID 1564 wrote to memory of 1616 1564 SHITYOURSELF.exe SHITYOURSELFSrv.exe PID 1564 wrote to memory of 1616 1564 SHITYOURSELF.exe SHITYOURSELFSrv.exe PID 1564 wrote to memory of 1616 1564 SHITYOURSELF.exe SHITYOURSELFSrv.exe PID 1564 wrote to memory of 1616 1564 SHITYOURSELF.exe SHITYOURSELFSrv.exe PID 1564 wrote to memory of 368 1564 SHITYOURSELF.exe wininit.exe PID 1564 wrote to memory of 368 1564 SHITYOURSELF.exe wininit.exe PID 1564 wrote to memory of 368 1564 SHITYOURSELF.exe wininit.exe PID 1564 wrote to memory of 368 1564 SHITYOURSELF.exe wininit.exe PID 1564 wrote to memory of 368 1564 SHITYOURSELF.exe wininit.exe PID 1564 wrote to memory of 368 1564 SHITYOURSELF.exe wininit.exe PID 1564 wrote to memory of 368 1564 SHITYOURSELF.exe wininit.exe PID 1564 wrote to memory of 376 1564 SHITYOURSELF.exe csrss.exe PID 1564 wrote to memory of 376 1564 SHITYOURSELF.exe csrss.exe PID 1564 wrote to memory of 376 1564 SHITYOURSELF.exe csrss.exe PID 1564 wrote to memory of 376 1564 SHITYOURSELF.exe csrss.exe PID 1564 wrote to memory of 376 1564 SHITYOURSELF.exe csrss.exe PID 1564 wrote to memory of 376 1564 SHITYOURSELF.exe csrss.exe PID 1564 wrote to memory of 376 1564 SHITYOURSELF.exe csrss.exe PID 1564 wrote to memory of 416 1564 SHITYOURSELF.exe winlogon.exe PID 1564 wrote to memory of 416 1564 SHITYOURSELF.exe winlogon.exe PID 1564 wrote to memory of 416 1564 SHITYOURSELF.exe winlogon.exe PID 1564 wrote to memory of 416 1564 SHITYOURSELF.exe winlogon.exe PID 1564 wrote to memory of 416 1564 SHITYOURSELF.exe winlogon.exe PID 1564 wrote to memory of 416 1564 SHITYOURSELF.exe winlogon.exe PID 1564 wrote to memory of 416 1564 SHITYOURSELF.exe winlogon.exe PID 1564 wrote to memory of 464 1564 SHITYOURSELF.exe services.exe PID 1564 wrote to memory of 464 1564 SHITYOURSELF.exe services.exe PID 1564 wrote to memory of 464 1564 SHITYOURSELF.exe services.exe PID 1564 wrote to memory of 464 1564 SHITYOURSELF.exe services.exe PID 1564 wrote to memory of 464 1564 SHITYOURSELF.exe services.exe PID 1564 wrote to memory of 464 1564 SHITYOURSELF.exe services.exe PID 1564 wrote to memory of 464 1564 SHITYOURSELF.exe services.exe PID 1564 wrote to memory of 472 1564 SHITYOURSELF.exe lsass.exe PID 1564 wrote to memory of 472 1564 SHITYOURSELF.exe lsass.exe PID 1564 wrote to memory of 472 1564 SHITYOURSELF.exe lsass.exe PID 1564 wrote to memory of 472 1564 SHITYOURSELF.exe lsass.exe PID 1564 wrote to memory of 472 1564 SHITYOURSELF.exe lsass.exe PID 1564 wrote to memory of 472 1564 SHITYOURSELF.exe lsass.exe PID 1564 wrote to memory of 472 1564 SHITYOURSELF.exe lsass.exe PID 1564 wrote to memory of 480 1564 SHITYOURSELF.exe lsm.exe PID 1564 wrote to memory of 480 1564 SHITYOURSELF.exe lsm.exe PID 1564 wrote to memory of 480 1564 SHITYOURSELF.exe lsm.exe PID 1564 wrote to memory of 480 1564 SHITYOURSELF.exe lsm.exe PID 1564 wrote to memory of 480 1564 SHITYOURSELF.exe lsm.exe PID 1564 wrote to memory of 480 1564 SHITYOURSELF.exe lsm.exe PID 1564 wrote to memory of 480 1564 SHITYOURSELF.exe lsm.exe PID 1564 wrote to memory of 592 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 592 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 592 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 592 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 592 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 592 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 592 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 672 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 672 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 672 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 672 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 672 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 672 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 672 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 756 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 756 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 756 1564 SHITYOURSELF.exe svchost.exe PID 1564 wrote to memory of 756 1564 SHITYOURSELF.exe svchost.exe
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\SHITYOURSELF.exe"C:\Users\Admin\AppData\Local\Temp\SHITYOURSELF.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SHITYOURSELFSrv.exeC:\Users\Admin\AppData\Local\Temp\SHITYOURSELFSrv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SHITYOURSELFSrv.exeMD5
69dc6baf34bc7dc2197cfc6d15bc0a83
SHA1193e9f44ce7e10fff6691ae05eb0a7c391698b25
SHA25660b9314940039281b6bb2216330400cf2b12d2125326ba2e69f251fb049409b2
SHA512c430d975aafafe90e97942b6fb54084c9985e50454320a33ab3b458ff2eac6b6c907e14ae105be8b0926222cd3298b62356d81b796128e620406b33fffc6a40c
-
C:\Users\Admin\AppData\Local\Temp\SHITYOURSELFSrv.exeMD5
69dc6baf34bc7dc2197cfc6d15bc0a83
SHA1193e9f44ce7e10fff6691ae05eb0a7c391698b25
SHA25660b9314940039281b6bb2216330400cf2b12d2125326ba2e69f251fb049409b2
SHA512c430d975aafafe90e97942b6fb54084c9985e50454320a33ab3b458ff2eac6b6c907e14ae105be8b0926222cd3298b62356d81b796128e620406b33fffc6a40c
-
\Users\Admin\AppData\Local\Temp\SHITYOURSELFSrv.exeMD5
69dc6baf34bc7dc2197cfc6d15bc0a83
SHA1193e9f44ce7e10fff6691ae05eb0a7c391698b25
SHA25660b9314940039281b6bb2216330400cf2b12d2125326ba2e69f251fb049409b2
SHA512c430d975aafafe90e97942b6fb54084c9985e50454320a33ab3b458ff2eac6b6c907e14ae105be8b0926222cd3298b62356d81b796128e620406b33fffc6a40c
-
memory/1616-56-0x0000000075611000-0x0000000075613000-memory.dmpFilesize
8KB
-
memory/1616-58-0x0000000077210000-0x0000000077390000-memory.dmpFilesize
1.5MB
-
memory/1616-59-0x000000007EFA0000-0x000000007EFAC000-memory.dmpFilesize
48KB
-
memory/1616-60-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB