Analysis
-
max time kernel
158s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4.exe
Resource
win10v2004-20220812-en
General
-
Target
27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4.exe
-
Size
63KB
-
MD5
cacf0f38fba52475702a218cf833a0e1
-
SHA1
320dcc4b41cb614678662ee12cb93dbeaf3f677b
-
SHA256
27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4
-
SHA512
d1b488d378bcb805cafa8c7eea8cd1cb1db19d7f06e97b5df9f1093eee06ac6b7ca69453ede8f2696092af9f83a796198c33201b7ab9719f8a82a84c293a60ef
-
SSDEEP
768:5GqgYBPpACiLusU3uKAVx8I0J8slx9InyAHhtRva+EzXxekcwUfRrtK6AcScAieF:pVZXwnvbRSBzVUpavGIvEB0rjiAP
Malware Config
Signatures
-
Contacts a large (547) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{A610B64E-B07D-429F-A3D9-8F79BBE3DC7E}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{ECE0AA51-3573-4DA5-9120-46FBB026E39B}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8451A75-3FE8-8809-BDBF-3663B0B5DF9C} 27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8451A75-3FE8-8809-BDBF-3663B0B5DF9C}\ = "cejlvhkljkhhbtvc" 27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8451A75-3FE8-8809-BDBF-3663B0B5DF9C}\LocalServer32 27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8451A75-3FE8-8809-BDBF-3663B0B5DF9C}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4.exe" 27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4.exe"C:\Users\Admin\AppData\Local\Temp\27f6f0c85368ff15ab66b300740259b8b6e63dee0d3d603e62058f639c629ee4.exe"1⤵
- Modifies registry class
PID:4348
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:340