Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-05-2022 17:59
Static task
static1
Behavioral task
behavioral1
Sample
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe
Resource
win10v2004-20220414-en
General
-
Target
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe
-
Size
149KB
-
MD5
44a81be517e01ab33abdba541a239b6e
-
SHA1
2890c3be34e4189fe0a11b4e60ff2b3203fcdd2a
-
SHA256
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769
-
SHA512
3361688b857d7e5db7fb5c9606a8e17c1487fb7e6dda9ed69d3c6c89ed94c51abb7e935971d35884bd71a8a55cc1bf436ea28997d404b50f91921895438515a0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winsvcs.exepid process 1936 winsvcs.exe -
Loads dropped DLL 2 IoCs
Processes:
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exepid process 1948 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe 1948 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe -
Processes:
winsvcs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winsvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winsvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winsvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" winsvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" winsvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winsvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winsvcs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\495060393034060\\winsvcs.exe" 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\495060393034060\\winsvcs.exe" 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe -
Drops file in Windows directory 3 IoCs
Processes:
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exedescription ioc process File created C:\Windows\495060393034060\winsvcs.exe 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe File opened for modification C:\Windows\495060393034060\winsvcs.exe 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe File opened for modification C:\Windows\495060393034060 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exedescription pid process target process PID 1948 wrote to memory of 1936 1948 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe winsvcs.exe PID 1948 wrote to memory of 1936 1948 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe winsvcs.exe PID 1948 wrote to memory of 1936 1948 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe winsvcs.exe PID 1948 wrote to memory of 1936 1948 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe winsvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe"C:\Users\Admin\AppData\Local\Temp\056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\495060393034060\winsvcs.exeC:\Windows\495060393034060\winsvcs.exe2⤵
- Executes dropped EXE
- Windows security modification
PID:1936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD544a81be517e01ab33abdba541a239b6e
SHA12890c3be34e4189fe0a11b4e60ff2b3203fcdd2a
SHA256056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769
SHA5123361688b857d7e5db7fb5c9606a8e17c1487fb7e6dda9ed69d3c6c89ed94c51abb7e935971d35884bd71a8a55cc1bf436ea28997d404b50f91921895438515a0
-
Filesize
149KB
MD544a81be517e01ab33abdba541a239b6e
SHA12890c3be34e4189fe0a11b4e60ff2b3203fcdd2a
SHA256056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769
SHA5123361688b857d7e5db7fb5c9606a8e17c1487fb7e6dda9ed69d3c6c89ed94c51abb7e935971d35884bd71a8a55cc1bf436ea28997d404b50f91921895438515a0
-
Filesize
149KB
MD544a81be517e01ab33abdba541a239b6e
SHA12890c3be34e4189fe0a11b4e60ff2b3203fcdd2a
SHA256056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769
SHA5123361688b857d7e5db7fb5c9606a8e17c1487fb7e6dda9ed69d3c6c89ed94c51abb7e935971d35884bd71a8a55cc1bf436ea28997d404b50f91921895438515a0