Analysis
-
max time kernel
51s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
821KB
-
MD5
cd2704f93fec8af2b68204e9cdbd624e
-
SHA1
b202b77493a3821a97cb08538590be106e5bb551
-
SHA256
27acd486acf23809f4792ed977bef8cd765d16a37fafe2a4e050284423bce11b
-
SHA512
768a730c93b83bfc6b3f3c91483043cf85cac2209c6f22413a5c7af99e2ba4cbcf2429f54857af0a08a7adffd350e4d99c351408a0ff3324175985780ccc5bce
-
SSDEEP
12288:0zLJtMwl1o8fRsbJnf7DQ1JOsZIdlYJcTT4l/kqKN7/UFaXyEjxo1TUI0yjSJKY9:0BFl1NOsZMlYa34lsqEayz23BjSwY9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 616 Highways.exe.pif -
Loads dropped DLL 1 IoCs
pid Process 1420 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1760 tasklist.exe 952 tasklist.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1172 PING.EXE 1516 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 616 Highways.exe.pif 616 Highways.exe.pif 616 Highways.exe.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 952 tasklist.exe Token: SeDebugPrivilege 1760 tasklist.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 616 Highways.exe.pif 616 Highways.exe.pif 616 Highways.exe.pif 616 Highways.exe.pif -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 616 Highways.exe.pif 616 Highways.exe.pif 616 Highways.exe.pif 616 Highways.exe.pif -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1348 wrote to memory of 844 1348 file.exe 26 PID 1348 wrote to memory of 844 1348 file.exe 26 PID 1348 wrote to memory of 844 1348 file.exe 26 PID 1348 wrote to memory of 844 1348 file.exe 26 PID 1348 wrote to memory of 1936 1348 file.exe 27 PID 1348 wrote to memory of 1936 1348 file.exe 27 PID 1348 wrote to memory of 1936 1348 file.exe 27 PID 1348 wrote to memory of 1936 1348 file.exe 27 PID 1936 wrote to memory of 1420 1936 cmd.exe 29 PID 1936 wrote to memory of 1420 1936 cmd.exe 29 PID 1936 wrote to memory of 1420 1936 cmd.exe 29 PID 1936 wrote to memory of 1420 1936 cmd.exe 29 PID 1420 wrote to memory of 952 1420 cmd.exe 30 PID 1420 wrote to memory of 952 1420 cmd.exe 30 PID 1420 wrote to memory of 952 1420 cmd.exe 30 PID 1420 wrote to memory of 952 1420 cmd.exe 30 PID 1420 wrote to memory of 748 1420 cmd.exe 31 PID 1420 wrote to memory of 748 1420 cmd.exe 31 PID 1420 wrote to memory of 748 1420 cmd.exe 31 PID 1420 wrote to memory of 748 1420 cmd.exe 31 PID 1420 wrote to memory of 1760 1420 cmd.exe 33 PID 1420 wrote to memory of 1760 1420 cmd.exe 33 PID 1420 wrote to memory of 1760 1420 cmd.exe 33 PID 1420 wrote to memory of 1760 1420 cmd.exe 33 PID 1420 wrote to memory of 1752 1420 cmd.exe 34 PID 1420 wrote to memory of 1752 1420 cmd.exe 34 PID 1420 wrote to memory of 1752 1420 cmd.exe 34 PID 1420 wrote to memory of 1752 1420 cmd.exe 34 PID 1420 wrote to memory of 900 1420 cmd.exe 35 PID 1420 wrote to memory of 900 1420 cmd.exe 35 PID 1420 wrote to memory of 900 1420 cmd.exe 35 PID 1420 wrote to memory of 900 1420 cmd.exe 35 PID 1420 wrote to memory of 616 1420 cmd.exe 36 PID 1420 wrote to memory of 616 1420 cmd.exe 36 PID 1420 wrote to memory of 616 1420 cmd.exe 36 PID 1420 wrote to memory of 616 1420 cmd.exe 36 PID 1420 wrote to memory of 1172 1420 cmd.exe 37 PID 1420 wrote to memory of 1172 1420 cmd.exe 37 PID 1420 wrote to memory of 1172 1420 cmd.exe 37 PID 1420 wrote to memory of 1172 1420 cmd.exe 37 PID 1936 wrote to memory of 1516 1936 cmd.exe 38 PID 1936 wrote to memory of 1516 1936 cmd.exe 38 PID 1936 wrote to memory of 1516 1936 cmd.exe 38 PID 1936 wrote to memory of 1516 1936 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\tapiunattend.exetapiunattend.exe2⤵PID:844
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Stephen.wpd & ping -n 5 localhost2⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"4⤵PID:748
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AVGUI.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\SysWOW64\find.exefind /I /N "avgui.exe"4⤵PID:1752
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^zehKAILsgvsVLa$" Lenses.wpd4⤵PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Highways.exe.pifHighways.exe.pif Z4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:616
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 54⤵
- Runs ping.exe
PID:1172
-
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost3⤵
- Runs ping.exe
PID:1516
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
925KB
MD5cd823c5853c2f2faeb7479294f354692
SHA113676d0930a5a8e9152a619ded85b0ab8ffcff54
SHA25629863ac96337f0452252ac26a57a21b34aeca7d4b25aac41d421e33bfaef515e
SHA5125f9f4e41e7ffd40ddc7b9dc55ba274ad7f42ec418c94d314943abfa9768df9eb467f41a4b4dbdaa51c3e6d74915fa30ad2ad1cf3c31d1a80c87cb6ee6c24e2b0
-
Filesize
12KB
MD53473e761d0dc7a8132b5bc81d4985800
SHA1291622594ae4514959b660b7979e3253cbac1302
SHA2564da54b57bb275335a43a03dcfd4243cd8f33999ef6ba9cbac0c78d4e6fd0afb6
SHA51290f3ae83be5167378b0883c299a60aa7e380cfd5d2f7be03e5abb794ba34626470ce663a219be86650e5a468aae8874fae717a7b4b18fcb49762cf1187bea3a4
-
Filesize
853KB
MD5971aed745154583cfd12eb4b0448f9ab
SHA1408251945d26a22b2bd8fa8f039fe471aad20393
SHA2564b010ec6f7f417456a7b9d185330164d40c2388fd45440e79b34587235f37d3d
SHA51284d50066f7cc542c15ee1382ef5a5df8066bff249ada5c9e028655ca55437b53ad7ab8bde1c3bce31d7040ecbe792b5813578d00df08388ad2f2c1fd6f7bacac
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a