Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe
Resource
win10v2004-20220901-en
General
-
Target
fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe
-
Size
364KB
-
MD5
82db0d00a83c02c144941dd7082827b0
-
SHA1
fad1c8a1d5fdab36743884e6b3342f3ebac2da42
-
SHA256
fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210
-
SHA512
f50a8ed53fb8f754f77898bdf2a1a5c492acb32513481f0c033567a2e10f540f6e87dc72a91c2b2a94ab5d74b6dd567be0fadd32b4627cda1e9bdbb589600da4
-
SSDEEP
6144:RypUBUqSkw5iItrSRU7h/9iDSVdFHGie1YEFIgzodnfKx/8GcsMBvMCmJp:cyUb/D9GO1iDK/HGioYyFz0+esTCm
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\skynewp\\svchost.exe" fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\skynewp\\svchost.exe" fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B7LOW32-3B2G-2VC0-G0EB-F2W5W4Q5TGMA} fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B7LOW32-3B2G-2VC0-G0EB-F2W5W4Q5TGMA}\StubPath = "C:\\Windows\\skynewp\\svchost.exe s" fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe -
resource yara_rule behavioral1/memory/1988-80-0x0000000013400000-0x00000000134AC000-memory.dmp upx behavioral1/memory/1988-83-0x0000000013400000-0x00000000134AC000-memory.dmp upx behavioral1/memory/1988-85-0x0000000013400000-0x00000000134AC000-memory.dmp upx behavioral1/memory/1988-89-0x0000000013400000-0x00000000134AC000-memory.dmp upx behavioral1/memory/1988-91-0x0000000013400000-0x00000000134AC000-memory.dmp upx behavioral1/memory/1988-90-0x0000000013400000-0x00000000134AC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\skynewp\\svchost.exe" fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\skynewp\\svchost.exe" fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 904 set thread context of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 1380 set thread context of 1988 1380 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 28 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\skynewp\svchost.exe fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe File opened for modification C:\Windows\skynewp\svchost.exe fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe File opened for modification C:\Windows\skynewp\ fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 904 wrote to memory of 1380 904 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 27 PID 1380 wrote to memory of 1988 1380 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 28 PID 1380 wrote to memory of 1988 1380 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 28 PID 1380 wrote to memory of 1988 1380 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 28 PID 1380 wrote to memory of 1988 1380 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 28 PID 1380 wrote to memory of 1988 1380 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 28 PID 1380 wrote to memory of 1988 1380 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 28 PID 1380 wrote to memory of 1988 1380 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 28 PID 1380 wrote to memory of 1988 1380 fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe"C:\Users\Admin\AppData\Local\Temp\fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exeC:\Users\Admin\AppData\Local\Temp\fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exeC:\Users\Admin\AppData\Local\Temp\fe9840d98728e464e92a659cb7fb65803f321b019ee323a102e82d99255f3210.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5afa8ed2fc8eac7fc0c232c77e76e95aa
SHA119f70e5f69437d0ffade6fb7b2a6a1d801f60d4c
SHA25614560b0d5e3bebd29443ee464a0caf0bb49bdc26c819bbde3d20e81aa354c564
SHA5124f0806a20b054a6911f8ada96cac29a362cc3b1fb8d0d132a7e2ca4f168730517a2f5c4fa3b56e4dfdfe0a9e8c635a05baf5575cee645d222857866bb8aa9c6b