Analysis
-
max time kernel
111s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe
Resource
win10v2004-20220901-en
General
-
Target
6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe
-
Size
116KB
-
MD5
0cc84c9198c0f8114b93b6ad9fc7fea0
-
SHA1
856783c900821b9ada521077a903146cf26b7547
-
SHA256
6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e
-
SHA512
5948499c50dfff291fbcf8cb4ce4215843dba48d06fa58b2abdac1f0180d2d55e212f73026a47d58817eca14f4a79bd71c1e3f423edf878e3f75026219a6b264
-
SSDEEP
1536:IMASiLNFZdO//OE1C90AdDNo75J84L67uKPYgat85tEKcyc2VDcm06tqfVXhwwAF:I3vO//l1uH67T8P7Qga3KcyjbHCg92
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0001000000022dfd-134.dat aspack_v212_v242 behavioral2/files/0x0001000000022dfd-135.dat aspack_v212_v242 behavioral2/files/0x0006000000022df7-140.dat aspack_v212_v242 behavioral2/files/0x0006000000022df7-141.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 3468 1c1c28c1.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 1c1c28c1.exe -
resource yara_rule behavioral2/files/0x0001000000022dfd-134.dat upx behavioral2/files/0x0001000000022dfd-135.dat upx behavioral2/memory/3468-136-0x00000000000D0000-0x00000000000F5000-memory.dmp upx behavioral2/memory/3468-137-0x00000000000D0000-0x00000000000F5000-memory.dmp upx behavioral2/memory/3468-138-0x00000000000D0000-0x00000000000F5000-memory.dmp upx behavioral2/files/0x0006000000022df7-140.dat upx behavioral2/files/0x0006000000022df7-141.dat upx behavioral2/memory/2516-142-0x0000000075840000-0x0000000075865000-memory.dmp upx behavioral2/memory/2516-143-0x0000000075840000-0x0000000075865000-memory.dmp upx behavioral2/memory/2516-145-0x0000000075840000-0x0000000075865000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 2516 Svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\4EED0B30.tmp 1c1c28c1.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 1c1c28c1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3468 1c1c28c1.exe 3468 1c1c28c1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2640 wrote to memory of 3468 2640 6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe 84 PID 2640 wrote to memory of 3468 2640 6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe 84 PID 2640 wrote to memory of 3468 2640 6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe"C:\Users\Admin\AppData\Local\Temp\6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\1c1c28c1.exeC:\1c1c28c1.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:2516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5aec8154a2a499457a2ba4e1fab3c6f20
SHA13dee15136d62a29ef1f5b5e99cf89efa94c6e15f
SHA2565233165c72533b728f7189f9f51f9b7ac2678586b93428bb917a38ff8eb97f06
SHA512721078a4315993132701ee67e6387dd571508f1c54850c715008755e71b1942c3a41b4ff2e82de392fbc5713b973b90794a88897a17016205c08220f9ded515e
-
Filesize
83KB
MD5aec8154a2a499457a2ba4e1fab3c6f20
SHA13dee15136d62a29ef1f5b5e99cf89efa94c6e15f
SHA2565233165c72533b728f7189f9f51f9b7ac2678586b93428bb917a38ff8eb97f06
SHA512721078a4315993132701ee67e6387dd571508f1c54850c715008755e71b1942c3a41b4ff2e82de392fbc5713b973b90794a88897a17016205c08220f9ded515e
-
Filesize
720B
MD59a86b418c86f9d13948065ec0ae19264
SHA101e5dd94a9a36a125816f3eec2af0c8d6bee3b8f
SHA256a83f77a6010eb9550bcb668923c40022cd64ad8039f82a808a8a9c90a65c6ee8
SHA51299b12506474656fff13b233af9bd27367d9f2bff10179a0992538259382a1c08d7abacbd4d7ff2effacd8b0a88389d2693a50fb1a2c944ac3b16568877fb7ac5
-
Filesize
83KB
MD589946df922e3ac9e727e2776b92a38da
SHA14f30513d9936fa7fff417d2280b1d2fa50dbf34c
SHA256bfb545005626b4394cd42d9977d41a29d39b1bd45eca5a42f22cced712c623e8
SHA512816511850a166ee3ed87baf2ccc5b8a8431120869762f4d2ce28173f54b77c3710c1f45345555aa8543238d89c31e49bd48c33c020aeb19d0ec29484e30c1ade
-
Filesize
83KB
MD589946df922e3ac9e727e2776b92a38da
SHA14f30513d9936fa7fff417d2280b1d2fa50dbf34c
SHA256bfb545005626b4394cd42d9977d41a29d39b1bd45eca5a42f22cced712c623e8
SHA512816511850a166ee3ed87baf2ccc5b8a8431120869762f4d2ce28173f54b77c3710c1f45345555aa8543238d89c31e49bd48c33c020aeb19d0ec29484e30c1ade