Analysis
-
max time kernel
38s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 04:16
Behavioral task
behavioral1
Sample
036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe
Resource
win10v2004-20220812-en
General
-
Target
036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe
-
Size
1002KB
-
MD5
abf731019396b276b321ecff074b8b57
-
SHA1
41df3510121f64ec2b3cf5168817cbc029360817
-
SHA256
036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16
-
SHA512
ec2137029a37102388884f1f16b9ed55cc58d8e6dfecc1d1ed97db2438e5d06cf901e4c26bb462053a0f3218df18c53eccbe86749bc0c528f9c14e0b5f492808
-
SSDEEP
24576:OeZJ8NI8DerQZb+md4wmNerQZb+md4wmA4:H8DerQZbd2JerQZbd23
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1612-55-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\KavUpda.exe 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe File opened for modification C:\Windows\system\KavUpda.exe 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 324 sc.exe 1440 sc.exe 1312 sc.exe 576 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 932 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1612 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1224 1612 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe 31 PID 1612 wrote to memory of 1224 1612 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe 31 PID 1612 wrote to memory of 1224 1612 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe 31 PID 1612 wrote to memory of 1224 1612 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe 31 PID 1612 wrote to memory of 1504 1612 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe 29 PID 1612 wrote to memory of 1504 1612 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe 29 PID 1612 wrote to memory of 1504 1612 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe 29 PID 1612 wrote to memory of 1504 1612 036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe"C:\Users\Admin\AppData\Local\Temp\036d34bcc908da095f28d6f5f28ff940493cdddc755fe7414b35f49842145a16.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵PID:1504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y3⤵PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat2⤵PID:1224
-
-
C:\Windows\SysWOW64\At.exeAt.exe 9:52:40 AM C:\Windows\Help\HelpCat.exe2⤵PID:952
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 9:51:44 AM C:\Windows\Sysinf.bat2⤵PID:1772
-
C:\Windows\SysWOW64\at.exeat 9:51:44 AM C:\Windows\Sysinf.bat3⤵PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 9:54:44 AM C:\Windows\Sysinf.bat2⤵PID:468
-
C:\Windows\SysWOW64\at.exeat 9:54:44 AM C:\Windows\Sysinf.bat3⤵PID:112
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:1560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y3⤵PID:1816
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:1312
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:576
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:324
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:932
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:1440
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:1524
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:1032
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:1556
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:920
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1040
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82B
MD53f7fbd2eb34892646e93fd5e6e343512
SHA1265ac1061b54f62350fb7a5f57e566454d013a66
SHA256e75e8d9bfc7a2876d908305186c3656e9de2a4af7f6927ccc6d8c812645abbc7
SHA51253d40eb2f05a23464fbf06193868e7cb30cf0df3da53586a75123fb2c37b29cdddda287ce134809d16a559d87fb20aee0e8add22d396fcb7a55f9a753739b140