Analysis
-
max time kernel
123s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-08-2022 14:41
Static task
static1
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v2004-20220812-en
General
-
Target
test.exe
-
Size
263KB
-
MD5
a2f9c46844fb65c1a71bbd58a484f9f1
-
SHA1
b209471a23252018d8424139fafcaa8fe7b200ea
-
SHA256
97053af6922baa9d199a4fa04c461728ac636b8161bd5295c3e847bc0adbe360
-
SHA512
8762faa05d2171e8067d46e4f86c8e688a0ee72808631e94444aa3c3b918eaf43119a1eb8a2d50384c33e511d4d8b432b6ba06a1a35b0890dfd5275adf8647fe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1784 sppvcc.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sppvcc.exe test.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sppvcc.exe test.exe -
Loads dropped DLL 2 IoCs
pid Process 1448 test.exe 1448 test.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 sppvcc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde sppvcc.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 612 chrome.exe 1996 chrome.exe 1996 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1784 1448 test.exe 28 PID 1448 wrote to memory of 1784 1448 test.exe 28 PID 1448 wrote to memory of 1784 1448 test.exe 28 PID 1996 wrote to memory of 600 1996 chrome.exe 32 PID 1996 wrote to memory of 600 1996 chrome.exe 32 PID 1996 wrote to memory of 600 1996 chrome.exe 32 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 2024 1996 chrome.exe 34 PID 1996 wrote to memory of 612 1996 chrome.exe 33 PID 1996 wrote to memory of 612 1996 chrome.exe 33 PID 1996 wrote to memory of 612 1996 chrome.exe 33 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35 PID 1996 wrote to memory of 1360 1996 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sppvcc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sppvcc.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66f4f50,0x7fef66f4f60,0x7fef66f4f702⤵PID:600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1116,8388679620086333456,3733075348712764449,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1116,8388679620086333456,3733075348712764449,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1124 /prefetch:22⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1116,8388679620086333456,3733075348712764449,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1756 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1116,8388679620086333456,3733075348712764449,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2076 /prefetch:12⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1116,8388679620086333456,3733075348712764449,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:12⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1116,8388679620086333456,3733075348712764449,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:2084
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5a2f9c46844fb65c1a71bbd58a484f9f1
SHA1b209471a23252018d8424139fafcaa8fe7b200ea
SHA25697053af6922baa9d199a4fa04c461728ac636b8161bd5295c3e847bc0adbe360
SHA5128762faa05d2171e8067d46e4f86c8e688a0ee72808631e94444aa3c3b918eaf43119a1eb8a2d50384c33e511d4d8b432b6ba06a1a35b0890dfd5275adf8647fe
-
Filesize
263KB
MD5a2f9c46844fb65c1a71bbd58a484f9f1
SHA1b209471a23252018d8424139fafcaa8fe7b200ea
SHA25697053af6922baa9d199a4fa04c461728ac636b8161bd5295c3e847bc0adbe360
SHA5128762faa05d2171e8067d46e4f86c8e688a0ee72808631e94444aa3c3b918eaf43119a1eb8a2d50384c33e511d4d8b432b6ba06a1a35b0890dfd5275adf8647fe
-
Filesize
263KB
MD5a2f9c46844fb65c1a71bbd58a484f9f1
SHA1b209471a23252018d8424139fafcaa8fe7b200ea
SHA25697053af6922baa9d199a4fa04c461728ac636b8161bd5295c3e847bc0adbe360
SHA5128762faa05d2171e8067d46e4f86c8e688a0ee72808631e94444aa3c3b918eaf43119a1eb8a2d50384c33e511d4d8b432b6ba06a1a35b0890dfd5275adf8647fe