Analysis
-
max time kernel
187s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:23
Static task
static1
Behavioral task
behavioral1
Sample
c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe
Resource
win10v2004-20220414-en
General
-
Target
c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe
-
Size
41KB
-
MD5
2187c3751c66ebd51e672ecc18c07965
-
SHA1
a287ec68b31443e15d4d01f0804cc509c1f2f719
-
SHA256
c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b
-
SHA512
cccaa3f996e729cd3246bbba5995a54bc708f418ae34bb833078326a33ffac9a4d821cdda8e51660577b6b1531f3b11128eb7fe07e091b8242f44281adc7db92
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\15f1bc79f41c5898c2f912f99de027b3 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exepid process 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exedescription pid process Token: SeDebugPrivilege 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exedescription pid process target process PID 956 wrote to memory of 1228 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe netsh.exe PID 956 wrote to memory of 1228 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe netsh.exe PID 956 wrote to memory of 1228 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe netsh.exe PID 956 wrote to memory of 1228 956 c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe"C:\Users\Admin\AppData\Local\Temp\c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exe"netsh.exe" firewall set opmode disable2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/956-54-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB
-
memory/956-55-0x00000000748C0000-0x0000000074E6B000-memory.dmpFilesize
5.7MB
-
memory/956-58-0x0000000000455000-0x0000000000466000-memory.dmpFilesize
68KB
-
memory/1228-56-0x0000000000000000-mapping.dmp