Analysis
-
max time kernel
33s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-05-2022 05:11
Static task
static1
Behavioral task
behavioral1
Sample
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
-
Size
1.6MB
-
MD5
d644eb3560601aa504917b281306a350
-
SHA1
b43554ea4fa8eed7a9d36e4172546487b627a45d
-
SHA256
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8
-
SHA512
c9a2100bd23d583d63c5fd37251b81407036f422d5cdcf2386419d78eaf25fbf2fa7bc6d34ef33f2b427ead5004ce92da9184a70d5c202d2dcb12571b403fc46
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\SystemApps = "C:\\Users\\Admin\\SystemApps\\AppSrv.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.execmd.execmd.exedescription pid process target process PID 1724 wrote to memory of 932 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 932 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 932 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 932 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 856 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 856 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 856 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 856 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 1548 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 1548 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 1548 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 1548 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1548 wrote to memory of 604 1548 cmd.exe attrib.exe PID 1548 wrote to memory of 604 1548 cmd.exe attrib.exe PID 1548 wrote to memory of 604 1548 cmd.exe attrib.exe PID 1548 wrote to memory of 604 1548 cmd.exe attrib.exe PID 1724 wrote to memory of 1152 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 1152 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 1152 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1724 wrote to memory of 1152 1724 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1152 wrote to memory of 1108 1152 cmd.exe reg.exe PID 1152 wrote to memory of 1108 1152 cmd.exe reg.exe PID 1152 wrote to memory of 1108 1152 cmd.exe reg.exe PID 1152 wrote to memory of 1108 1152 cmd.exe reg.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe"C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C "mkdir %userprofile%\SystemApps"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "copy C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe %userprofile%\SystemApps\AppSrv.exe"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "attrib +H %userprofile%\SystemApps"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib +H C:\Users\Admin\SystemApps3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.execmd /C "REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SystemApps /t REG_SZ /F /D %userprofile%\SystemApps\AppSrv.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SystemApps /t REG_SZ /F /D C:\Users\Admin\SystemApps\AppSrv.exe3⤵
- Adds Run key to start application
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/604-57-0x0000000000000000-mapping.dmp
-
memory/856-55-0x0000000000000000-mapping.dmp
-
memory/932-54-0x0000000000000000-mapping.dmp
-
memory/1108-59-0x0000000000000000-mapping.dmp
-
memory/1152-58-0x0000000000000000-mapping.dmp
-
memory/1548-56-0x0000000000000000-mapping.dmp