Analysis
-
max time kernel
148s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10-10-2022 23:41
Static task
static1
Behavioral task
behavioral1
Sample
eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe
Resource
win10v2004-20220812-en
General
-
Target
eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe
-
Size
572KB
-
MD5
455e9f029f5f2fbd8789fc271e5123a0
-
SHA1
a788711a4039f94e1ac2c20687330edcf02461c5
-
SHA256
eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b
-
SHA512
d0a1d4d69be3994802b435a12ff874573cf452035a59521ae865e9329739a187d118123d7529104d09839a071f086a6a9df2cbad85113bf99cc3abbb8b18add5
-
SSDEEP
12288:j0/zSknQPmbFlXTPhvHA7azeJrk8h2RvLaB:RqbFR9A7aCDh+eB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1776 sysmgr.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: sysmgr.exe File opened (read-only) \??\F: sysmgr.exe File opened (read-only) \??\G: sysmgr.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4" sysmgr.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe sysmgr.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\conf.dat sysmgr.exe File created C:\Windows\conf.dat sysmgr.exe File created C:\Windows\sysmgr.exe eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe File created C:\Windows\svc.dat eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1312 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1312 AUDIODG.EXE Token: 33 1312 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1312 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1776 2036 eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe 28 PID 2036 wrote to memory of 1776 2036 eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe 28 PID 2036 wrote to memory of 1776 2036 eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe 28 PID 2036 wrote to memory of 1776 2036 eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe"C:\Users\Admin\AppData\Local\Temp\eaee5c8cee15632c06618262b7c8611afb3693bafddc2a29f40f70cccd76614b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\sysmgr.exe"C:\Windows\sysmgr.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies WinLogon
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1776
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5862575e1aea8dfd7653f798f234bf1d8
SHA1a1a195ba3c0dd998fa5d0c91093b9a3ca0a3f94e
SHA25605f9acca749000561f436c3df79ea15b89f07ca0b58068add82daae1b0bfd885
SHA5124ad230ba77d17b7a18a20986545fce6d5976e462b22b723379fc6052af059fb5cd2fb80fcaae55df2844babc3927aeb3cbf42b493098ad701d6c4f316b21317e
-
Filesize
36KB
MD52373dfbdba70b54164d4fe163f7f59f1
SHA1fbc51778f9e4868ddce4763d0bef4cb48090e3f6
SHA256e506e529d2d1d80ba433d4dec9fcbf07506112c8d0a130bed322f03346640456
SHA51232e48c596def05ddd1c987ae54cb069f750e0e4a993aa9f5c1d69e11c49ca90f6d324dfb4fa7c29c7d642eb2d939b2efe9332e0f4f4cbc5a0b2893adbf8598ec
-
Filesize
36KB
MD52373dfbdba70b54164d4fe163f7f59f1
SHA1fbc51778f9e4868ddce4763d0bef4cb48090e3f6
SHA256e506e529d2d1d80ba433d4dec9fcbf07506112c8d0a130bed322f03346640456
SHA51232e48c596def05ddd1c987ae54cb069f750e0e4a993aa9f5c1d69e11c49ca90f6d324dfb4fa7c29c7d642eb2d939b2efe9332e0f4f4cbc5a0b2893adbf8598ec