Analysis

  • max time kernel
    142s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 00:34

General

  • Target

    6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b.exe

  • Size

    308KB

  • MD5

    0c2a1766abf78ca0185ccdf3c95fd762

  • SHA1

    5d5a058df1a326dabfd15b6d6966a607c840aa2d

  • SHA256

    6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b

  • SHA512

    e303a74b0f68a2740b8e861990e8157f35af20bf2000e1085716704ab4b3e855ace0bb339838a06bd82b7897c7f74fd555df2260854bdefaf43ea5241fc9c0b4

  • SSDEEP

    6144:fWs8Q7HJkxrWTS9SgRxkWiZHqB46OuGnyEf:18QzJlSI0xdiFqBNGf

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Unexpected DNS network traffic destination 9 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Modifies registry class 6 IoCs
  • NTFS ADS 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:460
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b.exe
      "C:\Users\Admin\AppData\Local\Temp\6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Users\Admin\AppData\Local\Temp\6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b.exe
        "C:\Users\Admin\AppData\Local\Temp\6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b.exe"
        3⤵
        • Modifies security service
        • Registers COM server for autorun
        • Drops file in Program Files directory
        • Modifies registry class
        • NTFS ADS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1852

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-18\$f545a6cb63874d75375b4ac5befd06b3\@

          Filesize

          2KB

          MD5

          2f56b53bf49295978ee49d3fc16df42a

          SHA1

          244dc6b6a013cd9bb1f8f0dbd2a0438a0b14244f

          SHA256

          c508a94a40b283ddfb0771d54189a91ec990417edd281773ad193eceb39b8d6b

          SHA512

          cef82737bd684b2ff63e53ab6016c05faf5467274c0a47752fbb7b9dc9ff0cae3cf4e4d61bc8b94d83adec8a17a80f51a2ab9da6ede53602ef13b6cf655e6b66

        • C:\$Recycle.Bin\S-1-5-18\$f545a6cb63874d75375b4ac5befd06b3\n

          Filesize

          25KB

          MD5

          9e0cd37b6d0809cf7d5fa5b521538d0d

          SHA1

          411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2

          SHA256

          55d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2

          SHA512

          b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5

        • C:\$Recycle.Bin\S-1-5-21-999675638-2867687379-27515722-1000\$f545a6cb63874d75375b4ac5befd06b3\n

          Filesize

          25KB

          MD5

          9e0cd37b6d0809cf7d5fa5b521538d0d

          SHA1

          411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2

          SHA256

          55d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2

          SHA512

          b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5

        • \$Recycle.Bin\S-1-5-18\$f545a6cb63874d75375b4ac5befd06b3\n

          Filesize

          25KB

          MD5

          9e0cd37b6d0809cf7d5fa5b521538d0d

          SHA1

          411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2

          SHA256

          55d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2

          SHA512

          b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5

        • \$Recycle.Bin\S-1-5-21-999675638-2867687379-27515722-1000\$f545a6cb63874d75375b4ac5befd06b3\n

          Filesize

          25KB

          MD5

          9e0cd37b6d0809cf7d5fa5b521538d0d

          SHA1

          411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2

          SHA256

          55d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2

          SHA512

          b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5

        • memory/1424-64-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/1424-63-0x0000000000300000-0x000000000032C000-memory.dmp

          Filesize

          176KB

        • memory/1424-71-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/1852-65-0x0000000000320000-0x000000000034C000-memory.dmp

          Filesize

          176KB

        • memory/1852-66-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/1852-59-0x00000000003B0000-0x00000000003EC000-memory.dmp

          Filesize

          240KB

        • memory/1852-70-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/1852-72-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB