Analysis
-
max time kernel
98s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2022, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
a4418c2116da8e81254ff3b332af619f9837d913c76182a5366a3901405ecef3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4418c2116da8e81254ff3b332af619f9837d913c76182a5366a3901405ecef3.dll
Resource
win10v2004-20220812-en
General
-
Target
a4418c2116da8e81254ff3b332af619f9837d913c76182a5366a3901405ecef3.dll
-
Size
83KB
-
MD5
cbf791ae024ac4c4a99052267021c523
-
SHA1
2d003593f9be5a6aebac97b5eb4c8e09f9b18c47
-
SHA256
a4418c2116da8e81254ff3b332af619f9837d913c76182a5366a3901405ecef3
-
SHA512
75b149dfec61d9a3faf45dbdd7d2d3166f11e83aef1c00d70340150f26254e378671851bd6171d7c7daf1d2d42f71589917f90ea657487c6abd396e8d385ef90
-
SSDEEP
1536:a27YDGlFwnzyfwsCVvpoTpMEOyHs27YDGl6Hp6p7C7Vr3s/4gDifHj:kGzwnzyfwsCV+VkyHGG8Hp6p+dswXfj
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List hrl72C4.tmp Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile hrl72C4.tmp Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications hrl72C4.tmp Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\hrl72C4.tmp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hrl72C4.tmp:*:enabled:@shell32.dll,-1" hrl72C4.tmp -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\ETC\HOSTS hrl72C4.tmp -
Executes dropped EXE 1 IoCs
pid Process 744 hrl72C4.tmp -
Program crash 1 IoCs
pid pid_target Process procid_target 1624 744 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 744 hrl72C4.tmp 744 hrl72C4.tmp -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp 744 hrl72C4.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 744 hrl72C4.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 744 hrl72C4.tmp 744 hrl72C4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3220 2108 rundll32.exe 82 PID 2108 wrote to memory of 3220 2108 rundll32.exe 82 PID 2108 wrote to memory of 3220 2108 rundll32.exe 82 PID 3220 wrote to memory of 744 3220 rundll32.exe 84 PID 3220 wrote to memory of 744 3220 rundll32.exe 84 PID 3220 wrote to memory of 744 3220 rundll32.exe 84 PID 744 wrote to memory of 600 744 hrl72C4.tmp 4 PID 744 wrote to memory of 600 744 hrl72C4.tmp 4 PID 744 wrote to memory of 600 744 hrl72C4.tmp 4 PID 744 wrote to memory of 600 744 hrl72C4.tmp 4 PID 744 wrote to memory of 600 744 hrl72C4.tmp 4 PID 744 wrote to memory of 600 744 hrl72C4.tmp 4 PID 744 wrote to memory of 656 744 hrl72C4.tmp 2 PID 744 wrote to memory of 656 744 hrl72C4.tmp 2 PID 744 wrote to memory of 656 744 hrl72C4.tmp 2 PID 744 wrote to memory of 656 744 hrl72C4.tmp 2 PID 744 wrote to memory of 656 744 hrl72C4.tmp 2 PID 744 wrote to memory of 656 744 hrl72C4.tmp 2 PID 744 wrote to memory of 772 744 hrl72C4.tmp 8 PID 744 wrote to memory of 772 744 hrl72C4.tmp 8 PID 744 wrote to memory of 772 744 hrl72C4.tmp 8 PID 744 wrote to memory of 772 744 hrl72C4.tmp 8 PID 744 wrote to memory of 772 744 hrl72C4.tmp 8 PID 744 wrote to memory of 772 744 hrl72C4.tmp 8 PID 744 wrote to memory of 780 744 hrl72C4.tmp 14 PID 744 wrote to memory of 780 744 hrl72C4.tmp 14 PID 744 wrote to memory of 780 744 hrl72C4.tmp 14 PID 744 wrote to memory of 780 744 hrl72C4.tmp 14 PID 744 wrote to memory of 780 744 hrl72C4.tmp 14 PID 744 wrote to memory of 780 744 hrl72C4.tmp 14 PID 744 wrote to memory of 788 744 hrl72C4.tmp 13 PID 744 wrote to memory of 788 744 hrl72C4.tmp 13 PID 744 wrote to memory of 788 744 hrl72C4.tmp 13 PID 744 wrote to memory of 788 744 hrl72C4.tmp 13 PID 744 wrote to memory of 788 744 hrl72C4.tmp 13 PID 744 wrote to memory of 788 744 hrl72C4.tmp 13 PID 744 wrote to memory of 904 744 hrl72C4.tmp 12 PID 744 wrote to memory of 904 744 hrl72C4.tmp 12 PID 744 wrote to memory of 904 744 hrl72C4.tmp 12 PID 744 wrote to memory of 904 744 hrl72C4.tmp 12 PID 744 wrote to memory of 904 744 hrl72C4.tmp 12 PID 744 wrote to memory of 904 744 hrl72C4.tmp 12 PID 744 wrote to memory of 952 744 hrl72C4.tmp 11 PID 744 wrote to memory of 952 744 hrl72C4.tmp 11 PID 744 wrote to memory of 952 744 hrl72C4.tmp 11 PID 744 wrote to memory of 952 744 hrl72C4.tmp 11 PID 744 wrote to memory of 952 744 hrl72C4.tmp 11 PID 744 wrote to memory of 952 744 hrl72C4.tmp 11 PID 744 wrote to memory of 312 744 hrl72C4.tmp 10 PID 744 wrote to memory of 312 744 hrl72C4.tmp 10 PID 744 wrote to memory of 312 744 hrl72C4.tmp 10 PID 744 wrote to memory of 312 744 hrl72C4.tmp 10 PID 744 wrote to memory of 312 744 hrl72C4.tmp 10 PID 744 wrote to memory of 312 744 hrl72C4.tmp 10 PID 744 wrote to memory of 388 744 hrl72C4.tmp 9 PID 744 wrote to memory of 388 744 hrl72C4.tmp 9 PID 744 wrote to memory of 388 744 hrl72C4.tmp 9 PID 744 wrote to memory of 388 744 hrl72C4.tmp 9 PID 744 wrote to memory of 388 744 hrl72C4.tmp 9 PID 744 wrote to memory of 388 744 hrl72C4.tmp 9 PID 744 wrote to memory of 608 744 hrl72C4.tmp 58 PID 744 wrote to memory of 608 744 hrl72C4.tmp 58 PID 744 wrote to memory of 608 744 hrl72C4.tmp 58 PID 744 wrote to memory of 608 744 hrl72C4.tmp 58
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:656
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:600
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:312
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:788
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:772
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3424
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3360
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3268
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4344
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵PID:3508
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:1064
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:2280
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4620
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4376
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3640
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3524
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:736
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:904
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3080
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2640
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4418c2116da8e81254ff3b332af619f9837d913c76182a5366a3901405ecef3.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4418c2116da8e81254ff3b332af619f9837d913c76182a5366a3901405ecef3.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\hrl72C4.tmpC:\Users\Admin\AppData\Local\Temp\hrl72C4.tmp4⤵
- Modifies firewall policy service
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 10525⤵
- Program crash
PID:1624
-
-
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2592
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2504
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2340
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2184
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:1888
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1892
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1856
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1640
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1288
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:948
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:8
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:1676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:2996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:5076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 744 -ip 7441⤵PID:4732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD53ccbb09bd8062641e5d61f3dddbca6b3
SHA1f2e629030b59521874d1a2f7ff20a1bfaccb464b
SHA2569504ee80b660e3ae74bd9ca742fbb5b5aba7106f046dc73fd78faecfb3748577
SHA512b9bfd23ee9cfb63ca60693b5fb2ebd4869c72f2d1d39aea3119979b092887e6f0ed7f3c4108fcf7f82df6a3d47bb6fd3eed5f82659ff7b7056e6935f3e76c57e
-
Filesize
71KB
MD53ccbb09bd8062641e5d61f3dddbca6b3
SHA1f2e629030b59521874d1a2f7ff20a1bfaccb464b
SHA2569504ee80b660e3ae74bd9ca742fbb5b5aba7106f046dc73fd78faecfb3748577
SHA512b9bfd23ee9cfb63ca60693b5fb2ebd4869c72f2d1d39aea3119979b092887e6f0ed7f3c4108fcf7f82df6a3d47bb6fd3eed5f82659ff7b7056e6935f3e76c57e