Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe
Resource
win10v2004-20220812-en
General
-
Target
1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe
-
Size
349KB
-
MD5
0748ab358a35fc8d4595dc3d4a8f8790
-
SHA1
0a8decbb0de31085414d04eb74143dd8cd012327
-
SHA256
1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a
-
SHA512
06f9de239c7f2bb43e2af2ec3ef69dbd969ccf767a60759f3966e753e5406c11ee67a797220b77e37f9b2edd1e0063f86d924a71e28036a75a6af87bfe57d023
-
SSDEEP
6144:p9NW40bKvfNHvJJ4q5kYoVNAHvditx5sxj3pix3+dC5ONWIWCF9lSde4uGUBKEi:p984hfNPUngvx9ixOdFoIWCblo3nE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1924 update.exe -
Loads dropped DLL 4 IoCs
pid Process 1692 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 1924 update.exe 1924 update.exe 1924 update.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Serverx = "C:\\Windows\\system32\\Serverx.exe" 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\i: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\l: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\m: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\p: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\j: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\s: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\b: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\e: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\f: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\h: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\k: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\n: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\o: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\r: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\u: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\w: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\y: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\g: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\q: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\t: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\v: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\x: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened (read-only) \??\z: 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Serverx.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Windows\SysWOW64\Serverx.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Uninstall.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\7-Zip\7z.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\KB822603.log update.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 1924 update.exe Token: SeRestorePrivilege 1924 update.exe Token: SeRestorePrivilege 1924 update.exe Token: SeRestorePrivilege 1924 update.exe Token: SeRestorePrivilege 1924 update.exe Token: SeRestorePrivilege 1924 update.exe Token: SeRestorePrivilege 1924 update.exe Token: SeBackupPrivilege 1924 update.exe Token: SeRestorePrivilege 1924 update.exe Token: SeShutdownPrivilege 1924 update.exe Token: SeSecurityPrivilege 1924 update.exe Token: SeTakeOwnershipPrivilege 1924 update.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 740 wrote to memory of 1692 740 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 27 PID 740 wrote to memory of 1692 740 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 27 PID 740 wrote to memory of 1692 740 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 27 PID 740 wrote to memory of 1692 740 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 27 PID 740 wrote to memory of 1692 740 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 27 PID 740 wrote to memory of 1692 740 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 27 PID 740 wrote to memory of 1692 740 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 27 PID 1692 wrote to memory of 1924 1692 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 28 PID 1692 wrote to memory of 1924 1692 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 28 PID 1692 wrote to memory of 1924 1692 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 28 PID 1692 wrote to memory of 1924 1692 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 28 PID 1692 wrote to memory of 1924 1692 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 28 PID 1692 wrote to memory of 1924 1692 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 28 PID 1692 wrote to memory of 1924 1692 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 28 PID 740 wrote to memory of 1392 740 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 20 PID 740 wrote to memory of 1392 740 1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe"C:\Users\Admin\AppData\Local\Temp\1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe"C:\Users\Admin\AppData\Local\Temp\1549cf706a1cf079b703808c86427c46b508717f90c2b865f30bbfbbe77e3c9a.exe"3⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\339e97a66bb88ac4f272f8c3\update\update.exec:\339e97a66bb88ac4f272f8c3\update\update.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5918f548704dea6917a2fcf719d715596
SHA1c8d0ed3b3e4ea7c5946fb6fb84b19b374930c673
SHA2565bc84e81cc2164f8eb6ac540da01be55be0fc31a966be57b31acd17164cbc770
SHA512d68affe0e1aa684cecbc8341c9c1d179b750fa4aca88f0fcaa5fff659c5651811ab6c02bbff53d9023fc545875084f73e62a3bbad9c501935e9cd3afbf1df0c0
-
Filesize
411KB
MD5918f548704dea6917a2fcf719d715596
SHA1c8d0ed3b3e4ea7c5946fb6fb84b19b374930c673
SHA2565bc84e81cc2164f8eb6ac540da01be55be0fc31a966be57b31acd17164cbc770
SHA512d68affe0e1aa684cecbc8341c9c1d179b750fa4aca88f0fcaa5fff659c5651811ab6c02bbff53d9023fc545875084f73e62a3bbad9c501935e9cd3afbf1df0c0
-
Filesize
411KB
MD5918f548704dea6917a2fcf719d715596
SHA1c8d0ed3b3e4ea7c5946fb6fb84b19b374930c673
SHA2565bc84e81cc2164f8eb6ac540da01be55be0fc31a966be57b31acd17164cbc770
SHA512d68affe0e1aa684cecbc8341c9c1d179b750fa4aca88f0fcaa5fff659c5651811ab6c02bbff53d9023fc545875084f73e62a3bbad9c501935e9cd3afbf1df0c0
-
Filesize
411KB
MD5918f548704dea6917a2fcf719d715596
SHA1c8d0ed3b3e4ea7c5946fb6fb84b19b374930c673
SHA2565bc84e81cc2164f8eb6ac540da01be55be0fc31a966be57b31acd17164cbc770
SHA512d68affe0e1aa684cecbc8341c9c1d179b750fa4aca88f0fcaa5fff659c5651811ab6c02bbff53d9023fc545875084f73e62a3bbad9c501935e9cd3afbf1df0c0
-
Filesize
411KB
MD5918f548704dea6917a2fcf719d715596
SHA1c8d0ed3b3e4ea7c5946fb6fb84b19b374930c673
SHA2565bc84e81cc2164f8eb6ac540da01be55be0fc31a966be57b31acd17164cbc770
SHA512d68affe0e1aa684cecbc8341c9c1d179b750fa4aca88f0fcaa5fff659c5651811ab6c02bbff53d9023fc545875084f73e62a3bbad9c501935e9cd3afbf1df0c0
-
Filesize
411KB
MD5918f548704dea6917a2fcf719d715596
SHA1c8d0ed3b3e4ea7c5946fb6fb84b19b374930c673
SHA2565bc84e81cc2164f8eb6ac540da01be55be0fc31a966be57b31acd17164cbc770
SHA512d68affe0e1aa684cecbc8341c9c1d179b750fa4aca88f0fcaa5fff659c5651811ab6c02bbff53d9023fc545875084f73e62a3bbad9c501935e9cd3afbf1df0c0
-
Filesize
4KB
MD530e39e98c98c84635f94b4302fd40f85
SHA151eb8fe6219aa91d90fcf105ea7640b806c438e2
SHA25670fab8484d99ad0a6effab6137a0db3af491a16f41ac44665aadb71699291abb
SHA51203a7f5f65b6678e08bd275d113eaddf9b97a972c033137a2d794bbccbd5b92a8bb518d7430c8caad5729ede8ba4d878f8c3ece3e317220242d6795ca4514f84d