Analysis

  • max time kernel
    138s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 11:59

General

  • Target

    f024466f53c915499bfb5f3fbb8cb8669ad4d1d09c1974303ed0265f625247cf.exe

  • Size

    656KB

  • MD5

    c63cd2dac85d84eeb1cd377a1c893a54

  • SHA1

    192c5010ce1e6fde1dbc624bac3e76909934cfd8

  • SHA256

    f024466f53c915499bfb5f3fbb8cb8669ad4d1d09c1974303ed0265f625247cf

  • SHA512

    cd01a04061f36f013f6d5d5acfc9e18261a1ac4b9d193f314c87e3d42c626674013bcd2dab72b39f6de73bc4cf96513c81beae17f557c552726a1858aae38a2b

  • SSDEEP

    12288:eklCt4P6+oXvSMn5e2UzenFiyx/TfqjShxUXrVPYgqGKjzqXVSdvnlyxsG:/l0qt7oFr1C2grqGKfqXkyxsG

Malware Config

Signatures

  • Windows security bypass 2 TTPs 1 IoCs
  • Executes dropped EXE 10 IoCs
  • Possible privilege escalation attempt 6 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 9 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f024466f53c915499bfb5f3fbb8cb8669ad4d1d09c1974303ed0265f625247cf.exe
    "C:\Users\Admin\AppData\Local\Temp\f024466f53c915499bfb5f3fbb8cb8669ad4d1d09c1974303ed0265f625247cf.exe"
    1⤵
    • Windows security bypass
    • Windows security modification
    • Adds Run key to start application
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Windows\SysWOW64\net.exe
      net stop wscsvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3376
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop wscsvc
        3⤵
          PID:5096
      • C:\Windows\SysWOW64\sc.exe
        sc config wscsvc start= disabled
        2⤵
        • Launches sc.exe
        PID:3368
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\test.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f C:\Windows\System32\wscapi.dll
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:5036
        • C:\Windows\SysWOW64\icacls.exe
          icacls C:\Windows\System32\wscapi.dll /grant administrators:F
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:4632
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f C:\Windows\System32\wscsvc.dll
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:4600
        • C:\Windows\SysWOW64\icacls.exe
          icacls C:\Windows\System32\wscsvc.dll /grant administrators:F
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:4612
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f C:\Windows\System32\wscui.cpl
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:4584
        • C:\Windows\SysWOW64\icacls.exe
          icacls C:\Windows\System32\wscui.dll /grant administrators:F
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:1776
      • C:\Users\Admin\AppData\Local\Temp\richtx64.exe
        C:\Users\Admin\AppData\Local\Temp\richtx64.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4220
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 572
            4⤵
            • Program crash
            PID:2272
        • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1268
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 556
            4⤵
            • Program crash
            PID:988
        • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1876
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 536
            4⤵
            • Program crash
            PID:3840
        • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:476
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 476 -s 544
            4⤵
            • Program crash
            PID:4724
        • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:548
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 536
            4⤵
            • Program crash
            PID:3460
        • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4868
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 536
            4⤵
            • Program crash
            PID:2104
        • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:816
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 536
            4⤵
            • Program crash
            PID:1836
        • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4604
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 536
            4⤵
            • Program crash
            PID:1844
        • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:532
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 536
            4⤵
            • Program crash
            PID:4660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4220 -ip 4220
      1⤵
        PID:4388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1268 -ip 1268
        1⤵
          PID:220
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1876 -ip 1876
          1⤵
            PID:4204
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 476 -ip 476
            1⤵
              PID:3188
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 548 -ip 548
              1⤵
                PID:3124
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4868 -ip 4868
                1⤵
                  PID:4276
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 816 -ip 816
                  1⤵
                    PID:1504
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4604 -ip 4604
                    1⤵
                      PID:1904
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 532 -ip 532
                      1⤵
                        PID:4668

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Persistence

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Defense Evasion

                      Disabling Security Tools

                      2
                      T1089

                      Modify Registry

                      3
                      T1112

                      File Permissions Modification

                      1
                      T1222

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\richtx64.exe
                        Filesize

                        656KB

                        MD5

                        c63cd2dac85d84eeb1cd377a1c893a54

                        SHA1

                        192c5010ce1e6fde1dbc624bac3e76909934cfd8

                        SHA256

                        f024466f53c915499bfb5f3fbb8cb8669ad4d1d09c1974303ed0265f625247cf

                        SHA512

                        cd01a04061f36f013f6d5d5acfc9e18261a1ac4b9d193f314c87e3d42c626674013bcd2dab72b39f6de73bc4cf96513c81beae17f557c552726a1858aae38a2b

                      • C:\Users\Admin\AppData\Local\Temp\richtx64.exe
                        Filesize

                        656KB

                        MD5

                        c63cd2dac85d84eeb1cd377a1c893a54

                        SHA1

                        192c5010ce1e6fde1dbc624bac3e76909934cfd8

                        SHA256

                        f024466f53c915499bfb5f3fbb8cb8669ad4d1d09c1974303ed0265f625247cf

                        SHA512

                        cd01a04061f36f013f6d5d5acfc9e18261a1ac4b9d193f314c87e3d42c626674013bcd2dab72b39f6de73bc4cf96513c81beae17f557c552726a1858aae38a2b

                      • C:\Users\Admin\AppData\Local\Temp\test.bat
                        Filesize

                        472B

                        MD5

                        ac2011628dc4208a7e1e643258296076

                        SHA1

                        4a6446899b076eded5efac094e414920acdd007c

                        SHA256

                        52a030529f1a391d55bc7741127f369e89c7c00d211982a9116202b750be0e68

                        SHA512

                        84296a39f4ff5c9ccf19906316a95cb06a42e321aa7fde5dbe8415b7fb50a2f9ff4ff1332f61fed7c953252eb5a72ec90a5cef6969729e787ce9e2500aae1b60

                      • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
                        Filesize

                        512KB

                        MD5

                        de2ff7dee35df67beb9abc9cc549867f

                        SHA1

                        7382cb4840a37f02a2e00b710982c6ad961b10ee

                        SHA256

                        ca07e5417a68876c0dd938e3f8a2c436632fb4328fec7d7f0938d73bad797908

                        SHA512

                        2eb4e4eea15e85775b037a078a32f6e423e4daf929ea8f62a74071bfebc7c06ed19bead8057aca4bdf0192c3b8e3a7a08efdb10b595d47606709b0ddafce06dc

                      • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
                        Filesize

                        512KB

                        MD5

                        de2ff7dee35df67beb9abc9cc549867f

                        SHA1

                        7382cb4840a37f02a2e00b710982c6ad961b10ee

                        SHA256

                        ca07e5417a68876c0dd938e3f8a2c436632fb4328fec7d7f0938d73bad797908

                        SHA512

                        2eb4e4eea15e85775b037a078a32f6e423e4daf929ea8f62a74071bfebc7c06ed19bead8057aca4bdf0192c3b8e3a7a08efdb10b595d47606709b0ddafce06dc

                      • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
                        Filesize

                        512KB

                        MD5

                        de2ff7dee35df67beb9abc9cc549867f

                        SHA1

                        7382cb4840a37f02a2e00b710982c6ad961b10ee

                        SHA256

                        ca07e5417a68876c0dd938e3f8a2c436632fb4328fec7d7f0938d73bad797908

                        SHA512

                        2eb4e4eea15e85775b037a078a32f6e423e4daf929ea8f62a74071bfebc7c06ed19bead8057aca4bdf0192c3b8e3a7a08efdb10b595d47606709b0ddafce06dc

                      • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
                        Filesize

                        512KB

                        MD5

                        de2ff7dee35df67beb9abc9cc549867f

                        SHA1

                        7382cb4840a37f02a2e00b710982c6ad961b10ee

                        SHA256

                        ca07e5417a68876c0dd938e3f8a2c436632fb4328fec7d7f0938d73bad797908

                        SHA512

                        2eb4e4eea15e85775b037a078a32f6e423e4daf929ea8f62a74071bfebc7c06ed19bead8057aca4bdf0192c3b8e3a7a08efdb10b595d47606709b0ddafce06dc

                      • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
                        Filesize

                        512KB

                        MD5

                        de2ff7dee35df67beb9abc9cc549867f

                        SHA1

                        7382cb4840a37f02a2e00b710982c6ad961b10ee

                        SHA256

                        ca07e5417a68876c0dd938e3f8a2c436632fb4328fec7d7f0938d73bad797908

                        SHA512

                        2eb4e4eea15e85775b037a078a32f6e423e4daf929ea8f62a74071bfebc7c06ed19bead8057aca4bdf0192c3b8e3a7a08efdb10b595d47606709b0ddafce06dc

                      • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
                        Filesize

                        512KB

                        MD5

                        de2ff7dee35df67beb9abc9cc549867f

                        SHA1

                        7382cb4840a37f02a2e00b710982c6ad961b10ee

                        SHA256

                        ca07e5417a68876c0dd938e3f8a2c436632fb4328fec7d7f0938d73bad797908

                        SHA512

                        2eb4e4eea15e85775b037a078a32f6e423e4daf929ea8f62a74071bfebc7c06ed19bead8057aca4bdf0192c3b8e3a7a08efdb10b595d47606709b0ddafce06dc

                      • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
                        Filesize

                        512KB

                        MD5

                        de2ff7dee35df67beb9abc9cc549867f

                        SHA1

                        7382cb4840a37f02a2e00b710982c6ad961b10ee

                        SHA256

                        ca07e5417a68876c0dd938e3f8a2c436632fb4328fec7d7f0938d73bad797908

                        SHA512

                        2eb4e4eea15e85775b037a078a32f6e423e4daf929ea8f62a74071bfebc7c06ed19bead8057aca4bdf0192c3b8e3a7a08efdb10b595d47606709b0ddafce06dc

                      • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
                        Filesize

                        512KB

                        MD5

                        de2ff7dee35df67beb9abc9cc549867f

                        SHA1

                        7382cb4840a37f02a2e00b710982c6ad961b10ee

                        SHA256

                        ca07e5417a68876c0dd938e3f8a2c436632fb4328fec7d7f0938d73bad797908

                        SHA512

                        2eb4e4eea15e85775b037a078a32f6e423e4daf929ea8f62a74071bfebc7c06ed19bead8057aca4bdf0192c3b8e3a7a08efdb10b595d47606709b0ddafce06dc

                      • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
                        Filesize

                        512KB

                        MD5

                        de2ff7dee35df67beb9abc9cc549867f

                        SHA1

                        7382cb4840a37f02a2e00b710982c6ad961b10ee

                        SHA256

                        ca07e5417a68876c0dd938e3f8a2c436632fb4328fec7d7f0938d73bad797908

                        SHA512

                        2eb4e4eea15e85775b037a078a32f6e423e4daf929ea8f62a74071bfebc7c06ed19bead8057aca4bdf0192c3b8e3a7a08efdb10b595d47606709b0ddafce06dc

                      • C:\Users\Admin\AppData\Local\Temp\wscsvc32.exe
                        Filesize

                        512KB

                        MD5

                        de2ff7dee35df67beb9abc9cc549867f

                        SHA1

                        7382cb4840a37f02a2e00b710982c6ad961b10ee

                        SHA256

                        ca07e5417a68876c0dd938e3f8a2c436632fb4328fec7d7f0938d73bad797908

                        SHA512

                        2eb4e4eea15e85775b037a078a32f6e423e4daf929ea8f62a74071bfebc7c06ed19bead8057aca4bdf0192c3b8e3a7a08efdb10b595d47606709b0ddafce06dc

                      • memory/476-159-0x0000000000000000-mapping.dmp
                      • memory/476-161-0x0000000000400000-0x000000000053B000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/532-175-0x0000000000000000-mapping.dmp
                      • memory/532-177-0x0000000000400000-0x000000000053B000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/548-162-0x0000000000000000-mapping.dmp
                      • memory/548-164-0x0000000000400000-0x000000000053B000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/548-165-0x0000000000400000-0x000000000053B000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/816-169-0x0000000000000000-mapping.dmp
                      • memory/816-171-0x0000000000400000-0x000000000053B000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1268-153-0x0000000000000000-mapping.dmp
                      • memory/1268-155-0x0000000000400000-0x000000000053B000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1776-148-0x0000000000000000-mapping.dmp
                      • memory/1876-156-0x0000000000000000-mapping.dmp
                      • memory/1876-158-0x0000000000400000-0x000000000053B000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/2260-135-0x0000000000000000-mapping.dmp
                      • memory/3368-134-0x0000000000000000-mapping.dmp
                      • memory/3376-133-0x0000000000000000-mapping.dmp
                      • memory/4220-152-0x0000000000400000-0x000000000053B000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/4220-149-0x0000000000000000-mapping.dmp
                      • memory/4508-143-0x0000000000400000-0x0000000000540000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/4508-136-0x0000000000000000-mapping.dmp
                      • memory/4532-132-0x0000000000400000-0x0000000000540000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/4532-139-0x0000000000400000-0x0000000000540000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/4584-147-0x0000000000000000-mapping.dmp
                      • memory/4600-145-0x0000000000000000-mapping.dmp
                      • memory/4604-174-0x0000000000400000-0x000000000053B000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/4604-172-0x0000000000000000-mapping.dmp
                      • memory/4612-146-0x0000000000000000-mapping.dmp
                      • memory/4632-144-0x0000000000000000-mapping.dmp
                      • memory/4868-168-0x0000000000400000-0x000000000053B000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/4868-166-0x0000000000000000-mapping.dmp
                      • memory/5036-141-0x0000000000000000-mapping.dmp
                      • memory/5096-142-0x0000000000000000-mapping.dmp