Analysis
-
max time kernel
43s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-04-2022 17:06
Static task
static1
Behavioral task
behavioral1
Sample
7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe
Resource
win10v2004-20220414-en
General
-
Target
7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe
-
Size
1010KB
-
MD5
9f1ce9c287893dd64fd52636ca6b8633
-
SHA1
8eabaaddd2ba0a07e9e1df042ab951f7f311ecda
-
SHA256
7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529
-
SHA512
e625ee5f29a78796c20c93fdc7c078c8e82053b2dd21bb50975ee616bcab70419128eedcc4447e77c221e49c839da53fcb4117fd1496da33a244ba1c3481c564
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.comsvchost.compid process 1960 svchost.com 964 svchost.com -
Deletes itself 1 IoCs
Processes:
powershell.exepid process 1484 powershell.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exesvchost.compid process 1952 cmd.exe 1960 svchost.com -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepid process 1484 powershell.exe 1484 powershell.exe 1484 powershell.exe 1484 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tasklist.exepowershell.exedescription pid process Token: SeDebugPrivilege 1956 tasklist.exe Token: SeDebugPrivilege 1484 powershell.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.execmd.execmd.exesvchost.comdescription pid process target process PID 632 wrote to memory of 1628 632 7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe cmd.exe PID 632 wrote to memory of 1628 632 7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe cmd.exe PID 632 wrote to memory of 1628 632 7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe cmd.exe PID 632 wrote to memory of 1628 632 7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe cmd.exe PID 1628 wrote to memory of 1952 1628 cmd.exe cmd.exe PID 1628 wrote to memory of 1952 1628 cmd.exe cmd.exe PID 1628 wrote to memory of 1952 1628 cmd.exe cmd.exe PID 1628 wrote to memory of 1952 1628 cmd.exe cmd.exe PID 1952 wrote to memory of 1956 1952 cmd.exe tasklist.exe PID 1952 wrote to memory of 1956 1952 cmd.exe tasklist.exe PID 1952 wrote to memory of 1956 1952 cmd.exe tasklist.exe PID 1952 wrote to memory of 1956 1952 cmd.exe tasklist.exe PID 1952 wrote to memory of 900 1952 cmd.exe find.exe PID 1952 wrote to memory of 900 1952 cmd.exe find.exe PID 1952 wrote to memory of 900 1952 cmd.exe find.exe PID 1952 wrote to memory of 900 1952 cmd.exe find.exe PID 1952 wrote to memory of 1684 1952 cmd.exe PING.EXE PID 1952 wrote to memory of 1684 1952 cmd.exe PING.EXE PID 1952 wrote to memory of 1684 1952 cmd.exe PING.EXE PID 1952 wrote to memory of 1684 1952 cmd.exe PING.EXE PID 1952 wrote to memory of 2004 1952 cmd.exe certutil.exe PID 1952 wrote to memory of 2004 1952 cmd.exe certutil.exe PID 1952 wrote to memory of 2004 1952 cmd.exe certutil.exe PID 1952 wrote to memory of 2004 1952 cmd.exe certutil.exe PID 1952 wrote to memory of 1960 1952 cmd.exe svchost.com PID 1952 wrote to memory of 1960 1952 cmd.exe svchost.com PID 1952 wrote to memory of 1960 1952 cmd.exe svchost.com PID 1952 wrote to memory of 1960 1952 cmd.exe svchost.com PID 1952 wrote to memory of 472 1952 cmd.exe PING.EXE PID 1952 wrote to memory of 472 1952 cmd.exe PING.EXE PID 1952 wrote to memory of 472 1952 cmd.exe PING.EXE PID 1952 wrote to memory of 472 1952 cmd.exe PING.EXE PID 1960 wrote to memory of 964 1960 svchost.com svchost.com PID 1960 wrote to memory of 964 1960 svchost.com svchost.com PID 1960 wrote to memory of 964 1960 svchost.com svchost.com PID 1960 wrote to memory of 964 1960 svchost.com svchost.com PID 632 wrote to memory of 1484 632 7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe powershell.exe PID 632 wrote to memory of 1484 632 7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe powershell.exe PID 632 wrote to memory of 1484 632 7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe powershell.exe PID 632 wrote to memory of 1484 632 7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe"C:\Users\Admin\AppData\Local\Temp\7bcd22e964544f14d0b786e95aa887a45316e81892723aebd95d7cca57bf0529.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < qRkbaZfHtQvAiFOHMqduUmyVaelyGrRcbnX.fTltuLzMpnthuhXiRBGBMfydOlwqYw2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq srvpost.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "srvpost.exe"4⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 1 dZfIyLIE.dZfIyLIE4⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\certutil.execertutil -decode jYFmYAyAEkCYMhGkNcEoWUAKvpNCfQhelWGC.ECNidNWLgupiMCdzHFabUeOMDlOXAOPGtdpSQqGuEZirExC S4⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.comsvchost.com S4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.com S5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command $oms=(Get-WmiObject win32_process -Filter "processid=$pid").parentprocessid; $sfl=(Get-WmiObject win32_process -Filter "processid=$oms").executablepath; Stop-Process -ID $oms -Force; Start-Sleep -s 1; Remove-Item -path $sfl2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EnCrFKxaFYGaHQPssbKEwIozdU.KdqKHwYYymuFPLQuItaXwJJboxVpVfoNLPJeEgYdJSJSkRFilesize
128KB
MD5de195cf29f1ed4b5e7056fc8cfb993d3
SHA194f5a2b8faeeddc28d6adc207aa07740446b94af
SHA25689839dda038a1bc588edcf731788e5fc4ad5378b986ebf7d15beae93628106a6
SHA51271e3102ff4fcdf2ae387e460e5b3eccdbcfb7d9ff127cad28813776ef3e5bd7b0ce588ff1c0cefa990c9b529d1aae2be1657d25ffbb59ec54bc2ec3d4d98f33f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SFilesize
583KB
MD5d95450ef9be60a657fde1e63bf76b592
SHA18d7c6cd69734ef874355f0c87b664d866c60d14d
SHA2566ad572f94bd856e82fa81b16fddba31e738d77c6a537894897f137b437ea063d
SHA512e4854531ed650dfc2e0c6b5e74d600063d2656d13c846181ab1626113dfbbe62cad03fccafc931cf3cab711fcd4162df29253077ac8569bb309e2c99164df5fa
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VzEvUlwPZuxtANiFWXqLtGqLFBRIgdWJUu.eEvkQxffglcYgHtybDKxfaTRzazBJlKlxQtwmMpsPdMApCDwFilesize
909KB
MD5589209d4b9c55814b42abacf62bd4b5e
SHA1b10a6eb66ccef27e76bd09d34e732656b76d352d
SHA256f9528942aceae1d9d6728f8a89cba5895e0d03e71cb0f9cef4c41613c51bb990
SHA5126acfffe7898ee69238927d8d62a7d2c005cec1426a17d1d33d24a29a7e12bdb069c0156682049e43520c35ee3d6812c49f94ea48dc38e5a9df670810152f0a68
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jYFmYAyAEkCYMhGkNcEoWUAKvpNCfQhelWGC.ECNidNWLgupiMCdzHFabUeOMDlOXAOPGtdpSQqGuEZirExCFilesize
802KB
MD565647870cbb41e7bab4b1037a631711c
SHA1f8a6c7bbf3fa9d4107368cfd6129e130d73f0dc3
SHA256b68d98a7e8756bb45db002f86f440a618bfc81e0983922b94e9361aeaa23850f
SHA5121be963ef232836a2ea8560643fe405840979494cee60134de42fc7990ab913c7dca9abda24cd5c63aee583325f87edf446c473d225cf3ded511db2ef09b21503
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qRkbaZfHtQvAiFOHMqduUmyVaelyGrRcbnX.fTltuLzMpnthuhXiRBGBMfydOlwqYwFilesize
4KB
MD58ebe2a6726580ea8f9dd37d942fa8339
SHA15380e207b0b2c4c1776251ffd42d2a769513a0fd
SHA2567dabf675d3e6944e8962f08c02bb1287b06bd398513f3111f5a8b60b5e00a8a6
SHA512efd73e9873d2d683eec8e7619d6374c6a93b82b4e7b190cddd139d7458316afc83c76b8ec60d75c03cb7f35aa2abab226122272b684d4126860d810e7c50d9e0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.comFilesize
910KB
MD56044ba604bb80aa7d9ad6dbfd9cadaca
SHA18cc61cc5c9e5c1d038cee584bb61078fec757ada
SHA2569e3036d12cda6931dfb6c658587bec8bdb87249e1bf390f28acd4de2bf1f86f0
SHA512ef128d4364fbf85d4ca69975cb0b3a753988610308e0da46589a01f64df4b139e71ff38264d6b77866ca68d7e9193d1a249b68fc5a68b5ac8e7aba18b87b691d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.comFilesize
910KB
MD56044ba604bb80aa7d9ad6dbfd9cadaca
SHA18cc61cc5c9e5c1d038cee584bb61078fec757ada
SHA2569e3036d12cda6931dfb6c658587bec8bdb87249e1bf390f28acd4de2bf1f86f0
SHA512ef128d4364fbf85d4ca69975cb0b3a753988610308e0da46589a01f64df4b139e71ff38264d6b77866ca68d7e9193d1a249b68fc5a68b5ac8e7aba18b87b691d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.comFilesize
910KB
MD56044ba604bb80aa7d9ad6dbfd9cadaca
SHA18cc61cc5c9e5c1d038cee584bb61078fec757ada
SHA2569e3036d12cda6931dfb6c658587bec8bdb87249e1bf390f28acd4de2bf1f86f0
SHA512ef128d4364fbf85d4ca69975cb0b3a753988610308e0da46589a01f64df4b139e71ff38264d6b77866ca68d7e9193d1a249b68fc5a68b5ac8e7aba18b87b691d
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.comFilesize
910KB
MD56044ba604bb80aa7d9ad6dbfd9cadaca
SHA18cc61cc5c9e5c1d038cee584bb61078fec757ada
SHA2569e3036d12cda6931dfb6c658587bec8bdb87249e1bf390f28acd4de2bf1f86f0
SHA512ef128d4364fbf85d4ca69975cb0b3a753988610308e0da46589a01f64df4b139e71ff38264d6b77866ca68d7e9193d1a249b68fc5a68b5ac8e7aba18b87b691d
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.comFilesize
910KB
MD56044ba604bb80aa7d9ad6dbfd9cadaca
SHA18cc61cc5c9e5c1d038cee584bb61078fec757ada
SHA2569e3036d12cda6931dfb6c658587bec8bdb87249e1bf390f28acd4de2bf1f86f0
SHA512ef128d4364fbf85d4ca69975cb0b3a753988610308e0da46589a01f64df4b139e71ff38264d6b77866ca68d7e9193d1a249b68fc5a68b5ac8e7aba18b87b691d
-
memory/472-67-0x0000000000000000-mapping.dmp
-
memory/900-58-0x0000000000000000-mapping.dmp
-
memory/964-72-0x0000000000000000-mapping.dmp
-
memory/1484-76-0x0000000000000000-mapping.dmp
-
memory/1484-78-0x0000000073FD0000-0x000000007457B000-memory.dmpFilesize
5.7MB
-
memory/1628-54-0x0000000000000000-mapping.dmp
-
memory/1684-59-0x0000000000000000-mapping.dmp
-
memory/1952-56-0x0000000000000000-mapping.dmp
-
memory/1956-57-0x0000000000000000-mapping.dmp
-
memory/1960-65-0x0000000000000000-mapping.dmp
-
memory/2004-62-0x0000000075391000-0x0000000075393000-memory.dmpFilesize
8KB
-
memory/2004-61-0x0000000000000000-mapping.dmp