Resubmissions
11/10/2022, 17:08
221011-vnmsrafbdn 610/10/2022, 15:31
221010-syaj3acdb3 1009/10/2022, 15:59
221009-tfb6lshbg4 1009/10/2022, 15:28
221009-swtvxshceq 1009/10/2022, 13:04
221009-qa2brshab7 1009/10/2022, 13:03
221009-qaj3gshab6 109/10/2022, 12:59
221009-p8jnyahaa6 1009/10/2022, 12:54
221009-p5m7yshbdm 1008/10/2022, 21:32
221008-1dxg4afgb8 1008/10/2022, 13:52
221008-q6p9daegh5 1Analysis
-
max time kernel
375s -
max time network
1596s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09/10/2022, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
fucker script.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fucker script.exe
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
fucker script.exe
Resource
win10v2004-20220812-en
General
-
Target
fucker script.exe
-
Size
104KB
-
MD5
db0655efbe0dbdef1df06207f5cb5b5b
-
SHA1
a8d48d5c0042ce359178d018c0873e8a7c2f27e8
-
SHA256
52972a23ab12b95cd51d71741db2cf276749e56030c092e2e4f0907dcb1fbd56
-
SHA512
5adc8463c3e148a66f8afdeefc31f2b3ffeb12b7641584d1d24306b0898da60a8b9b948bb4f9b7d693185f2daa9bd9437b3b84cebc0eabfa84dfcef6938e1704
-
SSDEEP
1536:m5iT3FccnYWkyjWpOku3yUyJCbyVAvy7+fRo:3LOcxkyjW3wvHq
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5116 sdiagnhost.exe 5116 sdiagnhost.exe 2640 sdiagnhost.exe 4876 sdiagnhost.exe 2640 sdiagnhost.exe 4876 sdiagnhost.exe 4432 sdiagnhost.exe 4432 sdiagnhost.exe 2452 sdiagnhost.exe 1044 sdiagnhost.exe 2452 sdiagnhost.exe 1044 sdiagnhost.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 5116 sdiagnhost.exe Token: SeBackupPrivilege 4836 svchost.exe Token: SeRestorePrivilege 4836 svchost.exe Token: SeSecurityPrivilege 4836 svchost.exe Token: SeTakeOwnershipPrivilege 4836 svchost.exe Token: 35 4836 svchost.exe Token: SeBackupPrivilege 4836 svchost.exe Token: SeRestorePrivilege 4836 svchost.exe Token: SeSecurityPrivilege 4836 svchost.exe Token: SeTakeOwnershipPrivilege 4836 svchost.exe Token: 35 4836 svchost.exe Token: SeDebugPrivilege 2640 sdiagnhost.exe Token: SeDebugPrivilege 4876 sdiagnhost.exe Token: SeDebugPrivilege 4432 sdiagnhost.exe Token: SeDebugPrivilege 2452 sdiagnhost.exe Token: SeDebugPrivilege 1044 sdiagnhost.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 1148 msdt.exe 1148 msdt.exe 4260 msdt.exe 4936 msdt.exe 4936 msdt.exe 4260 msdt.exe 2252 msdt.exe 2252 msdt.exe 4420 msdt.exe 4420 msdt.exe 416 msdt.exe 416 msdt.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4864 wrote to memory of 1148 4864 pcwrun.exe 69 PID 4864 wrote to memory of 1148 4864 pcwrun.exe 69 PID 4276 wrote to memory of 4260 4276 pcwrun.exe 76 PID 4276 wrote to memory of 4260 4276 pcwrun.exe 76 PID 4272 wrote to memory of 4936 4272 pcwrun.exe 77 PID 4272 wrote to memory of 4936 4272 pcwrun.exe 77 PID 2248 wrote to memory of 2252 2248 pcwrun.exe 83 PID 2248 wrote to memory of 2252 2248 pcwrun.exe 83 PID 4676 wrote to memory of 4420 4676 pcwrun.exe 87 PID 4676 wrote to memory of 4420 4676 pcwrun.exe 87 PID 664 wrote to memory of 416 664 pcwrun.exe 89 PID 664 wrote to memory of 416 664 pcwrun.exe 89 PID 1044 wrote to memory of 3476 1044 sdiagnhost.exe 95 PID 1044 wrote to memory of 3476 1044 sdiagnhost.exe 95 PID 3476 wrote to memory of 4768 3476 csc.exe 96 PID 3476 wrote to memory of 4768 3476 csc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\fucker script.exe"C:\Users\Admin\AppData\Local\Temp\fucker script.exe"1⤵PID:1792
-
C:\Windows\system32\pcwrun.exeC:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab1⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\System32\msdt.exeC:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCWDAB5.xml /skip TRUE2⤵
- Suspicious use of FindShellTrayWindow
PID:1148
-
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
C:\Windows\system32\pcwrun.exeC:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab1⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\System32\msdt.exeC:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCWF7B3.xml /skip TRUE2⤵
- Suspicious use of FindShellTrayWindow
PID:4260
-
-
C:\Windows\system32\pcwrun.exeC:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab1⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\System32\msdt.exeC:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCWF7C2.xml /skip TRUE2⤵
- Suspicious use of FindShellTrayWindow
PID:4936
-
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
C:\Windows\system32\pcwrun.exeC:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab1⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\System32\msdt.exeC:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCWFBAA.xml /skip TRUE2⤵
- Suspicious use of FindShellTrayWindow
PID:2252
-
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
C:\Windows\system32\pcwrun.exeC:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab1⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\System32\msdt.exeC:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCW407.xml /skip TRUE2⤵
- Suspicious use of FindShellTrayWindow
PID:416
-
-
C:\Windows\System32\msdt.exeC:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCW3C9.xml /skip TRUE1⤵
- Suspicious use of FindShellTrayWindow
PID:4420
-
C:\Windows\system32\pcwrun.exeC:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab1⤵
- Suspicious use of WriteProcessMemory
PID:4676
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fclgxrj2\fclgxrj2.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B58.tmp" "c:\Users\Admin\AppData\Local\Temp\fclgxrj2\CSC69D45DDF639C4C49ADBD5A2DA9247A43.TMP"3⤵PID:4768
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD52acda9afde4a2b6e1f2673e13e3b1932
SHA18516ebeed556ecf9f308758330904c69f305d3ac
SHA25648c56b450e3ebe3b36ef3cba57b36e19f31aeaaf962ab364d47bc314329f8310
SHA512f90e949b8fba9b7910157eeff8ee3c3830a4eaf9402c7e810bc4b79db739ad8bec8729101dd30b53ab9739260c2b2cdc996b5694c8fb9a8015bfb4b7afd77b2b
-
Filesize
7KB
MD5359def8545271306833a47cf0f3e67c2
SHA13d8d65deb4d78fde0979e22487885425602d843f
SHA256f97e518f0c409e7ee6a6570f9791f33fd74d72ce642229e500d5a0fc56349c89
SHA51275b9720bd4f6e2ab67c380692aec4a2ee543aa0fac1ec9a8b82255db4e18afb2589f40888afd65b9004f6368c47b397dc91ae79970c41f6ef893d4557bf58cd6
-
Filesize
7KB
MD554e26fb7d15b3bee261361fb0e30eadd
SHA1280b536a83b5d64cee5000e16cde4dedf976289f
SHA2562d288b1a625414b304a58923ee8eba3855f68da8648545c331e3be5595403a97
SHA5121cbf84765417aa6a23590589c3063c2f7ea783ca9ab76798ed3e18beb991e90e19a78f6b6a510248c2df2c7aa68c2cec18c26432adbb2622b05d01d470c3f897
-
Filesize
5KB
MD525fdef6a8f0b8331ebcd537f9b8f6276
SHA138d6ab3038e1abdf29cc9ef325aaba5f0ab9bcc8
SHA25699b3c40b32c01c8a2922c9cd4b43264f9f6cc5b773a9320fc697a44bc03873b3
SHA51233546bc2c65bc048256073f91672fe07366d067d1bf41413fdfa7e87953f1d582130dd41129f1d310dc034cfc26056b78c1d39de24a42707941cbf5ddc71c2ba
-
Filesize
742B
MD559b12d98f5afa5329432bb91de176d82
SHA1fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc
SHA2563ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd
SHA51294a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06
-
Filesize
742B
MD559b12d98f5afa5329432bb91de176d82
SHA1fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc
SHA2563ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd
SHA51294a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06
-
Filesize
742B
MD559b12d98f5afa5329432bb91de176d82
SHA1fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc
SHA2563ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd
SHA51294a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06
-
Filesize
742B
MD559b12d98f5afa5329432bb91de176d82
SHA1fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc
SHA2563ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd
SHA51294a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06
-
Filesize
742B
MD559b12d98f5afa5329432bb91de176d82
SHA1fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc
SHA2563ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd
SHA51294a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06
-
Filesize
742B
MD559b12d98f5afa5329432bb91de176d82
SHA1fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc
SHA2563ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd
SHA51294a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06
-
Filesize
1KB
MD511142208e4edd6971a6a3a0aa1fd5d4a
SHA14cefd4ce0a1ec804e165e77d44fee8cd385d4ee6
SHA256a9c5ce01c7daef8e124b9876f2dfbbe05945a85dfa96d3b4ab5671fde0fec693
SHA5126342ab6c68a3c35a89a9e96cc033d5b33ff8bc4d8e02929a6702f3672039de083c4c338116e43f13346e553951ab32bdc7fde730d19f33cdd2a12500b3bf403d
-
Filesize
5KB
MD5ebd28882f221d2ad68e8d20e1aae77e3
SHA1a670acbeda1835445c0def625b49c0c4b5113a17
SHA256c24718cd281c8165004b45b4c75061ad47562ca18d169b4e889ca5b76b930e10
SHA512fd0121b11916e816ae11a8990d711141b88a1fb36d3d977fffad9395bde926e56b0b6b7a49d9f64632ae5ab43d231f3df18f497a080a3563a470bf1a0a4b62f5
-
Filesize
16KB
MD52c245de268793272c235165679bf2a22
SHA15f31f80468f992b84e491c9ac752f7ac286e3175
SHA2564a6e9f400c72abc5b00d8b67ea36c06e3bc43ba9468fe748aebd704947ba66a0
SHA512aaecb935c9b4c27021977f211441ff76c71ba9740035ec439e9477ae707109ca5247ea776e2e65159dcc500b0b4324f3733e1dfb05cef10a39bb11776f74f03c
-
Filesize
6KB
MD55202c2aaa0bbfbcbdc51e271e059b066
SHA13f6a9ffb0455edc6a7e4170b54def16fd6e09a28
SHA2567fd5c0595d76d6dec1fcbace5bbcd8ff531d5acf97e53234c0008ff5a89d20e2
SHA51277500b97fcd6fe985962f8430f97627fedcf5af72d73d5e2b03e130bca1b6b552971b569be5fca5c9ece75ab92c2e4be416d67a0f24d3830d9579e5f96103ac9
-
Filesize
16KB
MD52c245de268793272c235165679bf2a22
SHA15f31f80468f992b84e491c9ac752f7ac286e3175
SHA2564a6e9f400c72abc5b00d8b67ea36c06e3bc43ba9468fe748aebd704947ba66a0
SHA512aaecb935c9b4c27021977f211441ff76c71ba9740035ec439e9477ae707109ca5247ea776e2e65159dcc500b0b4324f3733e1dfb05cef10a39bb11776f74f03c
-
Filesize
6KB
MD55202c2aaa0bbfbcbdc51e271e059b066
SHA13f6a9ffb0455edc6a7e4170b54def16fd6e09a28
SHA2567fd5c0595d76d6dec1fcbace5bbcd8ff531d5acf97e53234c0008ff5a89d20e2
SHA51277500b97fcd6fe985962f8430f97627fedcf5af72d73d5e2b03e130bca1b6b552971b569be5fca5c9ece75ab92c2e4be416d67a0f24d3830d9579e5f96103ac9
-
Filesize
652B
MD53f3ec038789d6444f4bc844797025d0a
SHA1eae6514087ce5b6919c220e015a52faaaa22f19d
SHA256a1fbaaba84f06110c365195475e55be5082280d92824634ade36a27a435579be
SHA5129425104126f62d5b42033885190bfa52269784787f8058718d9ea4e6098ddca1ea2c764fc0d6b0b9227ba05c1391a014ed1c468a725addaf90d5c78659a578e1
-
Filesize
5KB
MD526294ce6366662ebde6319c51362d56c
SHA1c571c0ffa13e644eed87523cbd445f4afb1983d1
SHA256685699daafafa281093b5c368c4d92715949fc300b182d234e800e613be5d8dc
SHA512bc91bb591368bc511ca5169b3c23cd69a163eeb77f0d7a083fe09cc6aa15d7044a24f95811fa1518f44368dffda6d346f44e1568e7a5373a6450a63ae31883ee
-
Filesize
356B
MD5b6e68a97c065e8c43f1333ff614e6c83
SHA1d6b581d4e125fd13ca517d86162208498d443627
SHA2561d252037c19ed0e1e1141af8dd386066edf07a2376b509b1466666a58868ad6f
SHA512970e504b305a702ae38f5cf40db557f6b9dbd763fc18d81e3cf48b1a306a9eea42f9e7f0e5500073dc72d8d0f11928d1b0f1c1a27f470242cf8376fa50b70edf