Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 19:07
Static task
static1
Behavioral task
behavioral1
Sample
447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe
Resource
win10v2004-20220414-en
General
-
Target
447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe
-
Size
268KB
-
MD5
ba6c566db676ab4bb59c2bebd3572e34
-
SHA1
867b008a64d9db16fc6c3663ddf0cb5236c89d37
-
SHA256
447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b
-
SHA512
818a07dc63825502a16c4af9645378040da7019734c5d0415901120ffd2fac7c884415bdc141d71813deb29d738d8118c231b5381025319ef564f5a5061353db
Malware Config
Extracted
gootkit
410
parking.dynophyl.com
parked.dynonortheast.com
trktrk.eu
smeinsurances.co.uk
-
vendor_id
410
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 864 cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mstsc.exepid process 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe 1004 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exepid process 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exepid process 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exemstsc.execmd.exedescription pid process target process PID 1376 wrote to memory of 1004 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe mstsc.exe PID 1376 wrote to memory of 1004 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe mstsc.exe PID 1376 wrote to memory of 1004 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe mstsc.exe PID 1376 wrote to memory of 1004 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe mstsc.exe PID 1376 wrote to memory of 1004 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe mstsc.exe PID 1376 wrote to memory of 1004 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe mstsc.exe PID 1376 wrote to memory of 1004 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe mstsc.exe PID 1376 wrote to memory of 1004 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe mstsc.exe PID 1376 wrote to memory of 1004 1376 447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe mstsc.exe PID 1004 wrote to memory of 864 1004 mstsc.exe cmd.exe PID 1004 wrote to memory of 864 1004 mstsc.exe cmd.exe PID 1004 wrote to memory of 864 1004 mstsc.exe cmd.exe PID 1004 wrote to memory of 864 1004 mstsc.exe cmd.exe PID 864 wrote to memory of 1592 864 cmd.exe attrib.exe PID 864 wrote to memory of 1592 864 cmd.exe attrib.exe PID 864 wrote to memory of 1592 864 cmd.exe attrib.exe PID 864 wrote to memory of 1592 864 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe"C:\Users\Admin\AppData\Local\Temp\447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\mstsc.exeC:\Windows\System32\mstsc.exe "C:\Users\Admin\AppData\Local\Temp\447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7107561.bat" "C:\Users\Admin\AppData\Local\Temp\447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe""3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\447cc763a5679488a14b4c990a13879dda434b87029cda1874b4c4746457488b.exe"4⤵
- Views/modifies file attributes
PID:1592
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5843d4220f1c3c75e4506b9d5beff12a6
SHA10349177c8ec3265bba9235c29cafb85c45f43888
SHA256ac1a92e2295f56287d771e406123a64d3228388b9b86069c6008629570725dd1
SHA5124a207bb3bfb858b55fa5d4f8d1d9a7be9e5c05088277cfbb4cc94957ac399f7c9235f7c2c686bafdbe82b5ffbff4e25fe945582de7e76ceed9e42f248d47b778