Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-05-2022 05:11
Static task
static1
Behavioral task
behavioral1
Sample
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
-
Size
1.6MB
-
MD5
d644eb3560601aa504917b281306a350
-
SHA1
b43554ea4fa8eed7a9d36e4172546487b627a45d
-
SHA256
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8
-
SHA512
c9a2100bd23d583d63c5fd37251b81407036f422d5cdcf2386419d78eaf25fbf2fa7bc6d34ef33f2b427ead5004ce92da9184a70d5c202d2dcb12571b403fc46
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemApps = "C:\\Users\\Admin\\SystemApps\\AppSrv.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.execmd.execmd.exedescription pid process target process PID 4572 wrote to memory of 3532 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4572 wrote to memory of 3532 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4572 wrote to memory of 3532 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4572 wrote to memory of 5032 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4572 wrote to memory of 5032 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4572 wrote to memory of 5032 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4572 wrote to memory of 1364 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4572 wrote to memory of 1364 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4572 wrote to memory of 1364 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 1364 wrote to memory of 4776 1364 cmd.exe attrib.exe PID 1364 wrote to memory of 4776 1364 cmd.exe attrib.exe PID 1364 wrote to memory of 4776 1364 cmd.exe attrib.exe PID 4572 wrote to memory of 4496 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4572 wrote to memory of 4496 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4572 wrote to memory of 4496 4572 6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe cmd.exe PID 4496 wrote to memory of 4296 4496 cmd.exe reg.exe PID 4496 wrote to memory of 4296 4496 cmd.exe reg.exe PID 4496 wrote to memory of 4296 4496 cmd.exe reg.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe"C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C "mkdir %userprofile%\SystemApps"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "copy C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe %userprofile%\SystemApps\AppSrv.exe"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "attrib +H %userprofile%\SystemApps"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib +H C:\Users\Admin\SystemApps3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.execmd /C "REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SystemApps /t REG_SZ /F /D %userprofile%\SystemApps\AppSrv.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SystemApps /t REG_SZ /F /D C:\Users\Admin\SystemApps\AppSrv.exe3⤵
- Adds Run key to start application
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1364-132-0x0000000000000000-mapping.dmp
-
memory/3532-130-0x0000000000000000-mapping.dmp
-
memory/4296-135-0x0000000000000000-mapping.dmp
-
memory/4496-134-0x0000000000000000-mapping.dmp
-
memory/4776-133-0x0000000000000000-mapping.dmp
-
memory/5032-131-0x0000000000000000-mapping.dmp