Analysis
-
max time kernel
143s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 12:18
Static task
static1
Behavioral task
behavioral1
Sample
c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe
Resource
win10v2004-20220812-en
General
-
Target
c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe
-
Size
288KB
-
MD5
a00b00897292a31af750ec0d7702a760
-
SHA1
895983c059fb503f6cbe52cda87ae6fe2f778665
-
SHA256
c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb
-
SHA512
910808b34854005806f80c274c08c483f8750efad6c5598d4f3f113a70df256e94fb720e08bd3b6df9165cddc1810778696b353e700a3fce98a765c01d73fda8
-
SSDEEP
3072:GqPL1/7w6ZAs+VBKiAmLy0wUNGbU7Y2xBRYEmq9TMLRuRSWjbdCz2hqG3Tp9TM9G:zQVjBeC9TMtuRRx0sL9TM9u
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4780 77582098.exe -
Sets DLL path for service in the registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 77582098.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 77582098.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 77582098.exe -
resource yara_rule behavioral2/files/0x000a000000022df3-134.dat upx behavioral2/files/0x000a000000022df3-133.dat upx behavioral2/memory/4780-136-0x0000000000550000-0x0000000000589000-memory.dmp upx behavioral2/files/0x0008000000022e0e-139.dat upx behavioral2/files/0x0008000000022e0e-140.dat upx behavioral2/memory/1012-141-0x0000000074A60000-0x0000000074A99000-memory.dmp upx behavioral2/memory/4780-145-0x0000000000550000-0x0000000000589000-memory.dmp upx behavioral2/files/0x0006000000022e0f-143.dat upx behavioral2/memory/1012-144-0x0000000074A60000-0x0000000074A99000-memory.dmp upx behavioral2/files/0x0006000000022e0f-146.dat upx behavioral2/memory/3696-147-0x00000000749F0000-0x0000000074A29000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1012 Svchost.exe 3696 Svchost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\34D90998.tmp 77582098.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 77582098.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 77582098.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 77582098.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4780 77582098.exe 4780 77582098.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1144 wrote to memory of 4780 1144 c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe 81 PID 1144 wrote to memory of 4780 1144 c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe 81 PID 1144 wrote to memory of 4780 1144 c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe"C:\Users\Admin\AppData\Local\Temp\c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\77582098.exeC:\77582098.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:1012
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
PID:3696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD52019b2838d672cebe97725033dc7398a
SHA16d4e99c06cf8ef1dfab95d62b6888216c16d721b
SHA25612f076ea183dd8febd8d61cdca4ad77895aadf2c3a871e6dc67e2d70820f7ced
SHA51210ed888f111f48a7951448960ed5aaf8e33add4e096b44e771e60daa0ff7453992d951fee923ef0560b9143dc2b6528ec9fe159913170e63e819a74babc9c918
-
Filesize
210KB
MD52019b2838d672cebe97725033dc7398a
SHA16d4e99c06cf8ef1dfab95d62b6888216c16d721b
SHA25612f076ea183dd8febd8d61cdca4ad77895aadf2c3a871e6dc67e2d70820f7ced
SHA51210ed888f111f48a7951448960ed5aaf8e33add4e096b44e771e60daa0ff7453992d951fee923ef0560b9143dc2b6528ec9fe159913170e63e819a74babc9c918
-
Filesize
720B
MD501dabc7950e97f79da6838986fc8bb2c
SHA1cac809d566b6b92e61a22e9875983961d1f55831
SHA256ee481586dd0d75458091d47436b50cbdf0bcbd3573929b2a4205601c348de425
SHA512b7c995b18ed5e2703c6bc492d6950a0bd2e9e440b900fbfea69df3c1089c3f1dff75cdc63dbef75be52348dcee218a14b950fe4f22bd8490593c5465c43b04de
-
Filesize
210KB
MD594e093112668837f74b208324fa2ac4f
SHA1a32ef9576d574578335d939cfa14f3eeaa1109a8
SHA256cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09
SHA5128f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d
-
Filesize
210KB
MD594e093112668837f74b208324fa2ac4f
SHA1a32ef9576d574578335d939cfa14f3eeaa1109a8
SHA256cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09
SHA5128f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d
-
Filesize
210KB
MD594e093112668837f74b208324fa2ac4f
SHA1a32ef9576d574578335d939cfa14f3eeaa1109a8
SHA256cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09
SHA5128f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d
-
Filesize
210KB
MD594e093112668837f74b208324fa2ac4f
SHA1a32ef9576d574578335d939cfa14f3eeaa1109a8
SHA256cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09
SHA5128f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d