Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    06-06-2022 03:48

General

  • Target

    winservices.exe

  • Size

    293KB

  • MD5

    a2585bf4942a42f05138655b88554846

  • SHA1

    5d8a9f833f1fdd52096207e21afe5f9b7653180c

  • SHA256

    a3fbfe25541744380cb53a2faca2d7c61f8e9973520e82acb379127a99db867d

  • SHA512

    b83d318454cb6cee7cb6d71962bd5a9d5d73bf34fba0a4527578534848f1f3d35e20ebb75551eedf608eb17689499be88a58209811479f3fe7c494907f65aa24

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\winservices.exe
    "C:\Users\Admin\AppData\Local\Temp\winservices.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1992

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1992-54-0x0000000001160000-0x00000000011AE000-memory.dmp
    Filesize

    312KB

  • memory/1992-55-0x0000000000230000-0x0000000000242000-memory.dmp
    Filesize

    72KB

  • memory/1992-56-0x0000000075DB1000-0x0000000075DB3000-memory.dmp
    Filesize

    8KB

  • memory/1992-57-0x0000000072B70000-0x0000000073EFF000-memory.dmp
    Filesize

    19.6MB

  • memory/1992-58-0x0000000072160000-0x0000000072B70000-memory.dmp
    Filesize

    10.1MB

  • memory/1992-59-0x0000000071980000-0x0000000072160000-memory.dmp
    Filesize

    7.9MB

  • memory/1992-60-0x0000000074730000-0x0000000074901000-memory.dmp
    Filesize

    1.8MB

  • memory/1992-61-0x0000000070C20000-0x0000000071976000-memory.dmp
    Filesize

    13.3MB

  • memory/1992-62-0x0000000074410000-0x000000007472B000-memory.dmp
    Filesize

    3.1MB

  • memory/1992-63-0x0000000074310000-0x000000007440C000-memory.dmp
    Filesize

    1008KB

  • memory/1992-64-0x00000000704E0000-0x0000000070C1E000-memory.dmp
    Filesize

    7.2MB

  • memory/1992-65-0x0000000070110000-0x0000000070233000-memory.dmp
    Filesize

    1.1MB

  • memory/1992-66-0x000000006FDD0000-0x000000006FF64000-memory.dmp
    Filesize

    1.6MB

  • memory/1992-67-0x000000006F0B0000-0x000000006FDCD000-memory.dmp
    Filesize

    13.1MB

  • memory/1992-68-0x0000000072B70000-0x0000000073EFF000-memory.dmp
    Filesize

    19.6MB

  • memory/1992-69-0x0000000072160000-0x0000000072B70000-memory.dmp
    Filesize

    10.1MB

  • memory/1992-70-0x0000000074730000-0x0000000074901000-memory.dmp
    Filesize

    1.8MB

  • memory/1992-71-0x0000000070C20000-0x0000000071976000-memory.dmp
    Filesize

    13.3MB

  • memory/1992-73-0x0000000074310000-0x000000007440C000-memory.dmp
    Filesize

    1008KB

  • memory/1992-72-0x0000000074410000-0x000000007472B000-memory.dmp
    Filesize

    3.1MB

  • memory/1992-74-0x0000000070110000-0x0000000070233000-memory.dmp
    Filesize

    1.1MB