Analysis
-
max time kernel
52s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 05:28
Static task
static1
Behavioral task
behavioral1
Sample
02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe
Resource
win10v2004-20220414-en
General
-
Target
02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe
-
Size
96KB
-
MD5
b85e836c181e4b209d56c0d2df72d53e
-
SHA1
e3bf80c50892d44db8391f00b3329863a9d19993
-
SHA256
02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744
-
SHA512
0b767f55b1033e1340c0a98c0a880bdac102f6de79520cc868c357c1d0e54de70f76798398d16167dfed8594a83ff012050cfc57aa9c63f1343f9d12160220bb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 640 w3wpdiag.exe 1008 w3wpdiag.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA w3wpdiag.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\w3wpdiag.exe 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe File created C:\Windows\system32\System.Web.Helpers.dll 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe File opened for modification C:\Windows\system32\System.Web.Helpers.dll 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe File opened for modification C:\Windows\system32\InstallUtil.InstallLog w3wpdiag.exe File opened for modification C:\Windows\system32\w3wpdiag.InstallLog w3wpdiag.exe File created C:\Windows\system32\w3wpdiag.InstallState w3wpdiag.exe File created C:\Windows\system32\w3wpdiag.exe 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1668 wrote to memory of 772 1668 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe 29 PID 1668 wrote to memory of 772 1668 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe 29 PID 1668 wrote to memory of 772 1668 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe 29 PID 772 wrote to memory of 640 772 cmd.exe 31 PID 772 wrote to memory of 640 772 cmd.exe 31 PID 772 wrote to memory of 640 772 cmd.exe 31 PID 1668 wrote to memory of 1548 1668 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe 33 PID 1668 wrote to memory of 1548 1668 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe 33 PID 1668 wrote to memory of 1548 1668 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe"C:\Users\Admin\AppData\Local\Temp\02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe"1⤵
- Windows security modification
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\cmd.exe"cmd.exe" /c w3wpdiag.exe -install2⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\system32\w3wpdiag.exew3wpdiag.exe -install3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:640
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c del *.InstallLog *.InstallState2⤵PID:1548
-
-
C:\Windows\system32\w3wpdiag.exe"C:\Windows\system32\w3wpdiag.exe"1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5371b4380080e3d94ffcae1a7e9a0d5e2
SHA1f7088075d1c798f27b0d269c97dc877ff16f1401
SHA2562986bae15cfa78b919d21dc070be944e949a027e8047a812026e35c66ab17353
SHA512990c3b43a9cdaa45432d2934aac005042f72ee4d1f441c474c07fa28e950c926e2474263bbc4bbd35aa74e4f6819f7194066f1f94dd300f2b04eee82bb7f5fb7
-
Filesize
58KB
MD5371b4380080e3d94ffcae1a7e9a0d5e2
SHA1f7088075d1c798f27b0d269c97dc877ff16f1401
SHA2562986bae15cfa78b919d21dc070be944e949a027e8047a812026e35c66ab17353
SHA512990c3b43a9cdaa45432d2934aac005042f72ee4d1f441c474c07fa28e950c926e2474263bbc4bbd35aa74e4f6819f7194066f1f94dd300f2b04eee82bb7f5fb7
-
Filesize
580B
MD53fe3db751374c86fcc44d7e14b9c11f9
SHA14ec4a7d01540a403a52f1bb48d9fc85f9066617e
SHA2564ffb0294f29222071c7b0f3c321d625f211024370d3b11ac71e80ad9936032a5
SHA512e5761e7f51291215aee6cb4bef734b2bdcc98e74d50761350ad033b4109a75b1dfc4ec9e76ff0d10adeeee349a54a266485f7c38e3e2f89b3fc8c31e8bf9f1e3
-
Filesize
135KB
MD54f13bec852002ea7208deaf82b53f90d
SHA1fffd7f988637d3f79bad6e6fb725f00aa8558044
SHA2566bdd4e1a2887176b20bdc2d710c5d81b68b18e7006a8281f4973e9e31e25f40f
SHA5122216dc754a787bc159e9bc363f8a57ee02caadce16dae41e73ce27cc37d7eef956983bf0dca7c78ef988030d69c4977a067b32667111ca10926a7d684771bf40
-
Filesize
561B
MD599b0f0d65146dadcd19adad9541f3d42
SHA11e5eb63e99ee18b4f91c66b350c2628f64e7870d
SHA2566dcc3fe3efb8f9aab0615b676d986cb75e765fc95cd04539964206050b80b7b1
SHA5123ca51387278296c7a541ee1ba9cccce00b7b667b75bd6a131defc60edfaf2b1c06096806881a3b9e9a9e4eba99e8e5b5f537e642463cd403e47190c894355488
-
Filesize
7KB
MD5362ce475f5d1e84641bad999c16727a0
SHA16b613c73acb58d259c6379bd820cca6f785cc812
SHA2561f78f1056761c6ebd8965ed2c06295bafa704b253aff56c492b93151ab642899
SHA5127630e1629cf4abecd9d3ddea58227b232d5c775cb480967762a6a6466be872e1d57123b08a6179fe1cfbc09403117d0f81bc13724f259a1d25c1325f1eac645b
-
Filesize
58KB
MD5371b4380080e3d94ffcae1a7e9a0d5e2
SHA1f7088075d1c798f27b0d269c97dc877ff16f1401
SHA2562986bae15cfa78b919d21dc070be944e949a027e8047a812026e35c66ab17353
SHA512990c3b43a9cdaa45432d2934aac005042f72ee4d1f441c474c07fa28e950c926e2474263bbc4bbd35aa74e4f6819f7194066f1f94dd300f2b04eee82bb7f5fb7