Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12/07/2022, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe
Resource
win10v2004-20220414-en
General
-
Target
4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe
-
Size
439KB
-
MD5
a7deb18758c9f922fbe6b532bdd0ba2c
-
SHA1
eb13ae29cc736d77b3b29e0c16101d049f5671f8
-
SHA256
4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d
-
SHA512
e6efa55bae81f7802e59d707110e018c41fda04ec8bc19c7b3edc353788377e0019e386d526ae5af8a36fdd18a2f0c606c32008787a4ef594fd21423cd6b6276
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 320 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe -
Loads dropped DLL 1 IoCs
pid Process 756 4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 myexternalip.com 4 myexternalip.com -
Modifies data under HKEY_USERS 42 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe -
Suspicious use of UnmapMainImage 3 IoCs
pid Process 756 4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 320 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 756 wrote to memory of 308 756 4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe 27 PID 756 wrote to memory of 308 756 4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe 27 PID 756 wrote to memory of 308 756 4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe 27 PID 756 wrote to memory of 308 756 4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe 27 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28 PID 308 wrote to memory of 2004 308 5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe"C:\Users\Admin\AppData\Local\Temp\4d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Roaming\winapp\5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exeC:\Users\Admin\AppData\Roaming\winapp\5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\system32\svchost.exesvchost.exe3⤵PID:2004
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A9917E0B-5CC8-44F6-A49F-486F18229E98} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1228
-
C:\Users\Admin\AppData\Roaming\winapp\5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exeC:\Users\Admin\AppData\Roaming\winapp\5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:320 -
C:\Windows\system32\svchost.exesvchost.exe3⤵
- Modifies data under HKEY_USERS
PID:796
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\winapp\5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe
Filesize439KB
MD5a7deb18758c9f922fbe6b532bdd0ba2c
SHA1eb13ae29cc736d77b3b29e0c16101d049f5671f8
SHA2564d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d
SHA512e6efa55bae81f7802e59d707110e018c41fda04ec8bc19c7b3edc353788377e0019e386d526ae5af8a36fdd18a2f0c606c32008787a4ef594fd21423cd6b6276
-
C:\Users\Admin\AppData\Roaming\winapp\5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe
Filesize439KB
MD5a7deb18758c9f922fbe6b532bdd0ba2c
SHA1eb13ae29cc736d77b3b29e0c16101d049f5671f8
SHA2564d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d
SHA512e6efa55bae81f7802e59d707110e018c41fda04ec8bc19c7b3edc353788377e0019e386d526ae5af8a36fdd18a2f0c606c32008787a4ef594fd21423cd6b6276
-
\Users\Admin\AppData\Roaming\winapp\5e578e555644625542f343e8d22a9536dac49a7209f2gae8c570dg66fe3d2c5e.exe
Filesize439KB
MD5a7deb18758c9f922fbe6b532bdd0ba2c
SHA1eb13ae29cc736d77b3b29e0c16101d049f5671f8
SHA2564d478d444633614431e232d8c11a9425cab39a7109e1fad8b470cf55ed2c1b4d
SHA512e6efa55bae81f7802e59d707110e018c41fda04ec8bc19c7b3edc353788377e0019e386d526ae5af8a36fdd18a2f0c606c32008787a4ef594fd21423cd6b6276