Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 12:18
Static task
static1
Behavioral task
behavioral1
Sample
c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe
Resource
win10v2004-20220812-en
General
-
Target
c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe
-
Size
288KB
-
MD5
a00b00897292a31af750ec0d7702a760
-
SHA1
895983c059fb503f6cbe52cda87ae6fe2f778665
-
SHA256
c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb
-
SHA512
910808b34854005806f80c274c08c483f8750efad6c5598d4f3f113a70df256e94fb720e08bd3b6df9165cddc1810778696b353e700a3fce98a765c01d73fda8
-
SSDEEP
3072:GqPL1/7w6ZAs+VBKiAmLy0wUNGbU7Y2xBRYEmq9TMLRuRSWjbdCz2hqG3Tp9TM9G:zQVjBeC9TMtuRRx0sL9TM9u
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1960 77582098.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 77582098.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-55.dat upx behavioral1/files/0x00140000000054ab-57.dat upx behavioral1/files/0x00090000000122e9-58.dat upx behavioral1/memory/1960-61-0x0000000000950000-0x0000000000989000-memory.dmp upx behavioral1/memory/1960-63-0x0000000075620000-0x0000000075680000-memory.dmp upx behavioral1/files/0x00080000000122ea-69.dat upx behavioral1/files/0x00080000000122ea-70.dat upx behavioral1/memory/2036-73-0x0000000074E80000-0x0000000074EB9000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1960 77582098.exe 2036 Svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\367E04D4.tmp 77582098.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 77582098.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1960 77582098.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1960 1788 c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe 28 PID 1788 wrote to memory of 1960 1788 c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe 28 PID 1788 wrote to memory of 1960 1788 c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe 28 PID 1788 wrote to memory of 1960 1788 c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe"C:\Users\Admin\AppData\Local\Temp\c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\77582098.exeC:\77582098.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD52019b2838d672cebe97725033dc7398a
SHA16d4e99c06cf8ef1dfab95d62b6888216c16d721b
SHA25612f076ea183dd8febd8d61cdca4ad77895aadf2c3a871e6dc67e2d70820f7ced
SHA51210ed888f111f48a7951448960ed5aaf8e33add4e096b44e771e60daa0ff7453992d951fee923ef0560b9143dc2b6528ec9fe159913170e63e819a74babc9c918
-
Filesize
210KB
MD52019b2838d672cebe97725033dc7398a
SHA16d4e99c06cf8ef1dfab95d62b6888216c16d721b
SHA25612f076ea183dd8febd8d61cdca4ad77895aadf2c3a871e6dc67e2d70820f7ced
SHA51210ed888f111f48a7951448960ed5aaf8e33add4e096b44e771e60daa0ff7453992d951fee923ef0560b9143dc2b6528ec9fe159913170e63e819a74babc9c918
-
Filesize
720B
MD5a81f622ed525330083ec51dec1536887
SHA1025bbda044f2a14c5b5067ad712389679a47a875
SHA25618d6be300056d7958aeddbb190c45770eab2bd4f931c9dc402da143615fa40ea
SHA512af43e838b27b7c2244ec579b20c3a83c378aa60ca97bc578f73521ebe99fa65aadb611f705ef9d527ba4c0941c6939e1c7aeaf5ff272d921b9db95cfe21b2f68
-
Filesize
210KB
MD594e093112668837f74b208324fa2ac4f
SHA1a32ef9576d574578335d939cfa14f3eeaa1109a8
SHA256cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09
SHA5128f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d
-
Filesize
210KB
MD594e093112668837f74b208324fa2ac4f
SHA1a32ef9576d574578335d939cfa14f3eeaa1109a8
SHA256cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09
SHA5128f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d
-
Filesize
210KB
MD594e093112668837f74b208324fa2ac4f
SHA1a32ef9576d574578335d939cfa14f3eeaa1109a8
SHA256cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09
SHA5128f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d