Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-05-2022 17:59
Static task
static1
Behavioral task
behavioral1
Sample
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe
Resource
win10v2004-20220414-en
General
-
Target
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe
-
Size
149KB
-
MD5
44a81be517e01ab33abdba541a239b6e
-
SHA1
2890c3be34e4189fe0a11b4e60ff2b3203fcdd2a
-
SHA256
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769
-
SHA512
3361688b857d7e5db7fb5c9606a8e17c1487fb7e6dda9ed69d3c6c89ed94c51abb7e935971d35884bd71a8a55cc1bf436ea28997d404b50f91921895438515a0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winsvcs.exepid process 2280 winsvcs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\495060393034060\\winsvcs.exe" 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\495060393034060\\winsvcs.exe" 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe -
Drops file in Windows directory 3 IoCs
Processes:
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exedescription ioc process File created C:\Windows\495060393034060\winsvcs.exe 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe File opened for modification C:\Windows\495060393034060\winsvcs.exe 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe File opened for modification C:\Windows\495060393034060 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3956 3300 WerFault.exe 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe 4828 2280 WerFault.exe winsvcs.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exedescription pid process target process PID 3300 wrote to memory of 2280 3300 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe winsvcs.exe PID 3300 wrote to memory of 2280 3300 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe winsvcs.exe PID 3300 wrote to memory of 2280 3300 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe winsvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe"C:\Users\Admin\AppData\Local\Temp\056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\495060393034060\winsvcs.exeC:\Windows\495060393034060\winsvcs.exe2⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 5283⤵
- Program crash
PID:4828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 5882⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3300 -ip 33001⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2280 -ip 22801⤵PID:4768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD544a81be517e01ab33abdba541a239b6e
SHA12890c3be34e4189fe0a11b4e60ff2b3203fcdd2a
SHA256056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769
SHA5123361688b857d7e5db7fb5c9606a8e17c1487fb7e6dda9ed69d3c6c89ed94c51abb7e935971d35884bd71a8a55cc1bf436ea28997d404b50f91921895438515a0
-
Filesize
149KB
MD544a81be517e01ab33abdba541a239b6e
SHA12890c3be34e4189fe0a11b4e60ff2b3203fcdd2a
SHA256056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769
SHA5123361688b857d7e5db7fb5c9606a8e17c1487fb7e6dda9ed69d3c6c89ed94c51abb7e935971d35884bd71a8a55cc1bf436ea28997d404b50f91921895438515a0