Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 20:28

General

  • Target

    27a2ba2e11277be6fed30fe80be6dbc0155f33afc2a4034589511e46d12b1039.exe

  • Size

    56KB

  • MD5

    d07f4ed1793cf00ced4ee5c72928604e

  • SHA1

    0a994075a4dbf44312cf9c16fe694073f06626b8

  • SHA256

    27a2ba2e11277be6fed30fe80be6dbc0155f33afc2a4034589511e46d12b1039

  • SHA512

    c2a6c184b915891eb8a8336374c10ef8300e94da43deb48ce690c9790fe79c244fed65cecc14591d22c06c1ca7ce5286461cf966976966089925758a1a20e2d0

  • SSDEEP

    1536:cPfQ5nuy2pUQ39GAjecus+amnUO1He0SgQFFX:cnanuy2JgcusrmUOXSgQT

Score
8/10

Malware Config

Signatures

  • Contacts a large (525) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27a2ba2e11277be6fed30fe80be6dbc0155f33afc2a4034589511e46d12b1039.exe
    "C:\Users\Admin\AppData\Local\Temp\27a2ba2e11277be6fed30fe80be6dbc0155f33afc2a4034589511e46d12b1039.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /installservice
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:32
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /start
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:4428
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\27a2ba2e11277be6fed30fe80be6dbc0155f33afc2a4034589511e46d12b1039.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:1664
  • C:\Windows\SysWOW64\urdvxc.exe
    "C:\Windows\SysWOW64\urdvxc.exe" /service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4956

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          56KB

          MD5

          d07f4ed1793cf00ced4ee5c72928604e

          SHA1

          0a994075a4dbf44312cf9c16fe694073f06626b8

          SHA256

          27a2ba2e11277be6fed30fe80be6dbc0155f33afc2a4034589511e46d12b1039

          SHA512

          c2a6c184b915891eb8a8336374c10ef8300e94da43deb48ce690c9790fe79c244fed65cecc14591d22c06c1ca7ce5286461cf966976966089925758a1a20e2d0

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          56KB

          MD5

          d07f4ed1793cf00ced4ee5c72928604e

          SHA1

          0a994075a4dbf44312cf9c16fe694073f06626b8

          SHA256

          27a2ba2e11277be6fed30fe80be6dbc0155f33afc2a4034589511e46d12b1039

          SHA512

          c2a6c184b915891eb8a8336374c10ef8300e94da43deb48ce690c9790fe79c244fed65cecc14591d22c06c1ca7ce5286461cf966976966089925758a1a20e2d0

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          56KB

          MD5

          d07f4ed1793cf00ced4ee5c72928604e

          SHA1

          0a994075a4dbf44312cf9c16fe694073f06626b8

          SHA256

          27a2ba2e11277be6fed30fe80be6dbc0155f33afc2a4034589511e46d12b1039

          SHA512

          c2a6c184b915891eb8a8336374c10ef8300e94da43deb48ce690c9790fe79c244fed65cecc14591d22c06c1ca7ce5286461cf966976966089925758a1a20e2d0

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          56KB

          MD5

          d07f4ed1793cf00ced4ee5c72928604e

          SHA1

          0a994075a4dbf44312cf9c16fe694073f06626b8

          SHA256

          27a2ba2e11277be6fed30fe80be6dbc0155f33afc2a4034589511e46d12b1039

          SHA512

          c2a6c184b915891eb8a8336374c10ef8300e94da43deb48ce690c9790fe79c244fed65cecc14591d22c06c1ca7ce5286461cf966976966089925758a1a20e2d0

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          56KB

          MD5

          d07f4ed1793cf00ced4ee5c72928604e

          SHA1

          0a994075a4dbf44312cf9c16fe694073f06626b8

          SHA256

          27a2ba2e11277be6fed30fe80be6dbc0155f33afc2a4034589511e46d12b1039

          SHA512

          c2a6c184b915891eb8a8336374c10ef8300e94da43deb48ce690c9790fe79c244fed65cecc14591d22c06c1ca7ce5286461cf966976966089925758a1a20e2d0

        • memory/32-136-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/856-135-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/1664-143-0x00000000001C0000-0x00000000001DF000-memory.dmp

          Filesize

          124KB

        • memory/4428-139-0x00000000001D0000-0x00000000001EF000-memory.dmp

          Filesize

          124KB

        • memory/4956-144-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4956-145-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB