Analysis
-
max time kernel
117s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe
Resource
win10v2004-20220901-en
General
-
Target
7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe
-
Size
167KB
-
MD5
25a2bb4e10d1b6e1d6b2d560ad3f07d7
-
SHA1
39c747d7ca4f738102e5073a7ef2d228167aa8c7
-
SHA256
7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9
-
SHA512
905a73ed462332941c94b6cb6b0fba4c7be20368402259e76b12aa216258135ab5c592d442339058ad9ab0c92896f6575d6b67edfd4c6404c9a0a2fe9ae3e842
-
SSDEEP
3072:Fp4mQ2kJ2VCsxvGWlkvh1vsKNe1cS63fDt7sVlZuOyJ:FY/Jy3pGWlkvh1jNe1cfPp7wnSJ
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable\System Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\AuthorizedApplications Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\GloballyOpenPorts Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging Process not Found -
Modifies security service 2 TTPs 22 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo\0 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSIn Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Security Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\ErrorControl = "0" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Parameters Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Security Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Parameters 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\ErrorControl = "0" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\RPC-EPMap Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\Teredo Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Type = "32" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Security 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Type = "32" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\DeleteFlag = "1" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSOut Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\DeleteFlag = "1" Process not Found -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\etadpug\ImagePath = "\"C:\\Program Files (x86)\\Google\\Desktop\\Install\\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\\ \\...\\\u202eﯹ๛\\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\\GoogleUpdate.exe\" <" 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe -
Deletes itself 1 IoCs
pid Process 1340 cmd.exe -
Unexpected DNS network traffic destination 11 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Update = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Desktop\\Install\\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\\❤≸⋙\\Ⱒ☠⍨\\\u202eﯹ๛\\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\\GoogleUpdate.exe\" >" 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini Process not Found File created \systemroot\assembly\GAC_32\Desktop.ini Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1264 set thread context of 1340 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 28 -
Drops file in Program Files directory 22 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files (x86)\Google\Desktop\Install\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\ \...\ﯹ๛\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\@\:@ Process not Found File opened for modification C:\Program Files\Windows Defender\en-US:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\fr-FR:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files (x86)\Google\Desktop\Install\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\ \...\ﯹ๛\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\@ Process not Found File created C:\Program Files (x86)\Google\Desktop\Install\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\ \...\ﯹ๛\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\GoogleUpdate.exe 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File created C:\Program Files (x86)\Google\Desktop\Install\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\ \...\ﯹ๛\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\@ 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\de-DE:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\es-ES:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\it-IT:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\ja-JP:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe -
NTFS ADS 19 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files (x86)\Google\Desktop\Install\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\ \...\ﯹ๛\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\@\:@ Process not Found File opened for modification C:\Program Files\Windows Defender\de-DE:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\en-US:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\it-IT:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\es-ES:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\fr-FR:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\ja-JP:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll:! 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 460 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeRestorePrivilege 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe Token: SeDebugPrivilege 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe Token: SeDebugPrivilege 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe Token: SeRestorePrivilege 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe Token: SeBackupPrivilege 460 Process not Found Token: SeRestorePrivilege 460 Process not Found Token: SeSecurityPrivilege 460 Process not Found Token: SeTakeOwnershipPrivilege 460 Process not Found Token: SeBackupPrivilege 460 Process not Found Token: SeRestorePrivilege 460 Process not Found Token: SeSecurityPrivilege 460 Process not Found Token: SeTakeOwnershipPrivilege 460 Process not Found Token: SeBackupPrivilege 460 Process not Found Token: SeRestorePrivilege 460 Process not Found Token: SeSecurityPrivilege 460 Process not Found Token: SeTakeOwnershipPrivilege 460 Process not Found Token: SeBackupPrivilege 460 Process not Found Token: SeRestorePrivilege 460 Process not Found Token: SeSecurityPrivilege 460 Process not Found Token: SeTakeOwnershipPrivilege 460 Process not Found Token: SeBackupPrivilege 460 Process not Found Token: SeRestorePrivilege 460 Process not Found Token: SeSecurityPrivilege 460 Process not Found Token: SeTakeOwnershipPrivilege 460 Process not Found Token: SeBackupPrivilege 460 Process not Found Token: SeRestorePrivilege 460 Process not Found Token: SeSecurityPrivilege 460 Process not Found Token: SeTakeOwnershipPrivilege 460 Process not Found Token: SeBackupPrivilege 460 Process not Found Token: SeRestorePrivilege 460 Process not Found Token: SeSecurityPrivilege 460 Process not Found Token: SeTakeOwnershipPrivilege 460 Process not Found Token: SeBackupPrivilege 460 Process not Found Token: SeRestorePrivilege 460 Process not Found Token: SeSecurityPrivilege 460 Process not Found Token: SeTakeOwnershipPrivilege 460 Process not Found Token: SeDebugPrivilege 460 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1232 Process not Found 1232 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1232 Process not Found 1232 Process not Found -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1340 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 28 PID 1264 wrote to memory of 1340 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 28 PID 1264 wrote to memory of 1340 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 28 PID 1264 wrote to memory of 1340 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 28 PID 1264 wrote to memory of 1340 1264 7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe"C:\Users\Admin\AppData\Local\Temp\7096686a979adfbfc6d155ac228af65d22654a75f37b8223c26072884c633af9.exe"1⤵
- Modifies security service
- Sets service image path in registry
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Deletes itself
PID:1340
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Google\Desktop\Install\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\ \...\ﯹ๛\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\@
Filesize2KB
MD58b141b9022e49a2f7f90b92e4a391fca
SHA121edd1de612b52f1448d427004308596818a08f2
SHA256345213eb5d30a012a014efaf1495ea3c22b6a95960921574536c3240a031eef1
SHA51248aa190096bdf5b151f1f8877f3ad738bd3fd441bbf961909cdb7d74b2eb809b20bc62703a8fa2c91907466d59bdb31148e2bed3a76fad6147dfc92876664aaf