Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 16:25

General

  • Target

    e94c7b10169fa3617acea2c6d4e15cce2c6b20b86399bb228733f64269dc6b64.exe

  • Size

    358KB

  • MD5

    02636f2c6b97af721e7c2270912b8ed2

  • SHA1

    e45be4c809daa1d1060988cb26c5648fcf6ced14

  • SHA256

    e94c7b10169fa3617acea2c6d4e15cce2c6b20b86399bb228733f64269dc6b64

  • SHA512

    68575dad73b177a5657e0787a3f9d0dcfd8aead76b5e734a0fd13a6ac6a9b7c9af9c60799718886f0f5b8a7b0199b72a19193ecf19cd65a853b376f20c1ef503

  • SSDEEP

    6144:Ulvap+AMQRUY3Yxagwg6sCtzN8B0pSwEgFHPJZ0+sq2Wp83FjXf10hVIGN5:Tp+lOIxa1gmtzlpEgxP34/jXf1UWK5

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Unexpected DNS network traffic destination 4 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e94c7b10169fa3617acea2c6d4e15cce2c6b20b86399bb228733f64269dc6b64.exe
    "C:\Users\Admin\AppData\Local\Temp\e94c7b10169fa3617acea2c6d4e15cce2c6b20b86399bb228733f64269dc6b64.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AC33.tmp\facebook hack.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Users\Admin\AppData\Local\Temp\AC33.tmp\facebook.exe
        facebook.exe
        3⤵
        • Modifies WinLogon for persistence
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Modifies Installed Components in the registry
        • Loads dropped DLL
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3236
        • C:\Windows\SysWOW64\fservice.exe
          C:\Windows\system32\fservice.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:2256
          • C:\Windows\services.exe
            C:\Windows\services.exe -XP
            5⤵
            • Modifies WinLogon for persistence
            • Adds policy Run key to start application
            • Executes dropped EXE
            • Modifies Installed Components in the registry
            • Loads dropped DLL
            • Modifies WinLogon
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3472
            • C:\Windows\SysWOW64\NET.exe
              NET STOP srservice
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4924
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 STOP srservice
                7⤵
                  PID:4076
              • C:\Windows\SysWOW64\NET.exe
                NET STOP navapsvc
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4904
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 STOP navapsvc
                  7⤵
                    PID:2976
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\AC33.tmp\facebook.exe.bat
              4⤵
                PID:1420

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\AC33.tmp\facebook hack.bat

          Filesize

          30B

          MD5

          9b66f7c2cf84e1d276e74a87df9c0fcc

          SHA1

          1297329e5536bf725585465a892f2d75697933d4

          SHA256

          51c13dd52e7559cfac97f6d5fa4ec3d6fde4dd7aff29cacac821336d1e6fdcde

          SHA512

          6bb01b2eb047e4ce74ecc58603efe11a769c58acae864239cfe72d5a300eae6a721a9a30c24328a7be4dc1269b242cff6972c5fdad8341b1750f07b24fd0c4e0

        • C:\Users\Admin\AppData\Local\Temp\AC33.tmp\facebook.exe

          Filesize

          342KB

          MD5

          88a4c8c3f8e63f4c4c0ca74fb1dc7c92

          SHA1

          eb4a538eb05a59e319eeb6361a32e0bd4af83330

          SHA256

          b216b86ce11076b71ffd60436da766749f257113ff031600b517a054b8feb2e8

          SHA512

          ef1004fdcf259b62b0da97a010788b0e66d0a69cded0774235c9521b1a5a3f8bef456c8e56bdec45cc02ab1a6e4d762659f6ea7ff498574b4fa6e8c3da08bd3b

        • C:\Users\Admin\AppData\Local\Temp\AC33.tmp\facebook.exe

          Filesize

          342KB

          MD5

          88a4c8c3f8e63f4c4c0ca74fb1dc7c92

          SHA1

          eb4a538eb05a59e319eeb6361a32e0bd4af83330

          SHA256

          b216b86ce11076b71ffd60436da766749f257113ff031600b517a054b8feb2e8

          SHA512

          ef1004fdcf259b62b0da97a010788b0e66d0a69cded0774235c9521b1a5a3f8bef456c8e56bdec45cc02ab1a6e4d762659f6ea7ff498574b4fa6e8c3da08bd3b

        • C:\Users\Admin\AppData\Local\Temp\AC33.tmp\facebook.exe.bat

          Filesize

          151B

          MD5

          cf8f124428954032a5c3200d325f89c8

          SHA1

          b07698e1705ea9c168719eb1c6126bad792c6432

          SHA256

          a68e4172db41073b56e9d0f832a77ed08b78e07eed0ab5e5ffa9e27f069b92a7

          SHA512

          b7b16f040c91d45e083e2eabafc1902f5375d72f49bd435ac537a95ea8eb85b8668c1cee1fe6d32f49940a53f69358d8a9cf2d21e6fe3369cba7da67c1285452

        • C:\Windows\SysWOW64\fservice.exe

          Filesize

          342KB

          MD5

          88a4c8c3f8e63f4c4c0ca74fb1dc7c92

          SHA1

          eb4a538eb05a59e319eeb6361a32e0bd4af83330

          SHA256

          b216b86ce11076b71ffd60436da766749f257113ff031600b517a054b8feb2e8

          SHA512

          ef1004fdcf259b62b0da97a010788b0e66d0a69cded0774235c9521b1a5a3f8bef456c8e56bdec45cc02ab1a6e4d762659f6ea7ff498574b4fa6e8c3da08bd3b

        • C:\Windows\SysWOW64\fservice.exe

          Filesize

          342KB

          MD5

          88a4c8c3f8e63f4c4c0ca74fb1dc7c92

          SHA1

          eb4a538eb05a59e319eeb6361a32e0bd4af83330

          SHA256

          b216b86ce11076b71ffd60436da766749f257113ff031600b517a054b8feb2e8

          SHA512

          ef1004fdcf259b62b0da97a010788b0e66d0a69cded0774235c9521b1a5a3f8bef456c8e56bdec45cc02ab1a6e4d762659f6ea7ff498574b4fa6e8c3da08bd3b

        • C:\Windows\SysWOW64\reginv.dll

          Filesize

          36KB

          MD5

          562e0d01d6571fa2251a1e9f54c6cc69

          SHA1

          83677ad3bc630aa6327253c7b3deffbd4a8ce905

          SHA256

          c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6

          SHA512

          166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea

        • C:\Windows\SysWOW64\reginv.dll

          Filesize

          36KB

          MD5

          562e0d01d6571fa2251a1e9f54c6cc69

          SHA1

          83677ad3bc630aa6327253c7b3deffbd4a8ce905

          SHA256

          c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6

          SHA512

          166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea

        • C:\Windows\SysWOW64\reginv.dll

          Filesize

          36KB

          MD5

          562e0d01d6571fa2251a1e9f54c6cc69

          SHA1

          83677ad3bc630aa6327253c7b3deffbd4a8ce905

          SHA256

          c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6

          SHA512

          166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea

        • C:\Windows\SysWOW64\reginv.dll

          Filesize

          36KB

          MD5

          562e0d01d6571fa2251a1e9f54c6cc69

          SHA1

          83677ad3bc630aa6327253c7b3deffbd4a8ce905

          SHA256

          c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6

          SHA512

          166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea

        • C:\Windows\SysWOW64\reginv.dll

          Filesize

          36KB

          MD5

          562e0d01d6571fa2251a1e9f54c6cc69

          SHA1

          83677ad3bc630aa6327253c7b3deffbd4a8ce905

          SHA256

          c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6

          SHA512

          166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea

        • C:\Windows\SysWOW64\winkey.dll

          Filesize

          13KB

          MD5

          b4c72da9fd1a0dcb0698b7da97daa0cd

          SHA1

          b25a79e8ea4c723c58caab83aed6ea48de7ed759

          SHA256

          45d266269634ba2de70f179a26d7224111e677e66b38dff2802851b71ce4458f

          SHA512

          f5f184416c5381d275bc093c9275e9fdb35c58e2c401d188aef097950013de6e43269da5d4dd5e7baea34735bd7de664d15fe487b2292fd66926c9845b0cd066

        • C:\Windows\services.exe

          Filesize

          342KB

          MD5

          88a4c8c3f8e63f4c4c0ca74fb1dc7c92

          SHA1

          eb4a538eb05a59e319eeb6361a32e0bd4af83330

          SHA256

          b216b86ce11076b71ffd60436da766749f257113ff031600b517a054b8feb2e8

          SHA512

          ef1004fdcf259b62b0da97a010788b0e66d0a69cded0774235c9521b1a5a3f8bef456c8e56bdec45cc02ab1a6e4d762659f6ea7ff498574b4fa6e8c3da08bd3b

        • C:\Windows\services.exe

          Filesize

          342KB

          MD5

          88a4c8c3f8e63f4c4c0ca74fb1dc7c92

          SHA1

          eb4a538eb05a59e319eeb6361a32e0bd4af83330

          SHA256

          b216b86ce11076b71ffd60436da766749f257113ff031600b517a054b8feb2e8

          SHA512

          ef1004fdcf259b62b0da97a010788b0e66d0a69cded0774235c9521b1a5a3f8bef456c8e56bdec45cc02ab1a6e4d762659f6ea7ff498574b4fa6e8c3da08bd3b

        • C:\Windows\system\sservice.exe

          Filesize

          342KB

          MD5

          88a4c8c3f8e63f4c4c0ca74fb1dc7c92

          SHA1

          eb4a538eb05a59e319eeb6361a32e0bd4af83330

          SHA256

          b216b86ce11076b71ffd60436da766749f257113ff031600b517a054b8feb2e8

          SHA512

          ef1004fdcf259b62b0da97a010788b0e66d0a69cded0774235c9521b1a5a3f8bef456c8e56bdec45cc02ab1a6e4d762659f6ea7ff498574b4fa6e8c3da08bd3b

        • memory/2256-160-0x0000000000400000-0x00000000005FC000-memory.dmp

          Filesize

          2.0MB

        • memory/2256-148-0x0000000000400000-0x00000000005FC000-memory.dmp

          Filesize

          2.0MB

        • memory/2608-132-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/2608-166-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/2608-133-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/3236-164-0x0000000000400000-0x00000000005FC000-memory.dmp

          Filesize

          2.0MB

        • memory/3236-162-0x0000000000400000-0x00000000005FC000-memory.dmp

          Filesize

          2.0MB

        • memory/3236-139-0x0000000000400000-0x00000000005FC000-memory.dmp

          Filesize

          2.0MB

        • memory/3472-155-0x0000000002BC1000-0x0000000002BC5000-memory.dmp

          Filesize

          16KB

        • memory/3472-149-0x0000000000400000-0x00000000005FC000-memory.dmp

          Filesize

          2.0MB

        • memory/3472-150-0x0000000010000000-0x000000001000B000-memory.dmp

          Filesize

          44KB

        • memory/3472-167-0x0000000000400000-0x00000000005FC000-memory.dmp

          Filesize

          2.0MB