Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe
Resource
win10v2004-20220812-en
General
-
Target
78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe
-
Size
130KB
-
MD5
16d518f07b60a68155e3bcd1d38d66ae
-
SHA1
50e5d757e176947c982a5e8681edd7a015a8deb1
-
SHA256
78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31
-
SHA512
8bbcaa000d66e42a59887d9eddef5285837bb1ad654d4610a27c571f3d71cb37c4fa2d637045e219cf36147fd120d47d413a9dfcb17b35f1df450d344002606d
-
SSDEEP
3072:HbRBxl5RBzt8OP4xI6xjVwYarMQO0I85aR4:nxl5Rdy646mzWON85L
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe -
Loads dropped DLL 1 IoCs
pid Process 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmdrtc32.dl_ 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe File created C:\Windows\SysWOW64\wmdrtc32.dll 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe File created C:\Windows\rundl132.exe 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe File created C:\Windows\Logo1_.exe 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4196 wrote to memory of 2544 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 81 PID 4196 wrote to memory of 2544 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 81 PID 4196 wrote to memory of 2544 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 81 PID 2544 wrote to memory of 2696 2544 net.exe 83 PID 2544 wrote to memory of 2696 2544 net.exe 83 PID 2544 wrote to memory of 2696 2544 net.exe 83 PID 4196 wrote to memory of 4832 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 85 PID 4196 wrote to memory of 4832 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 85 PID 4196 wrote to memory of 4832 4196 78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe"C:\Users\Admin\AppData\Local\Temp\78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"3⤵PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a77B5.bat2⤵PID:4832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5d5c3e8917472b4bec070689201ccc86a
SHA1799d3429d0f190ada54565215da4e7e2171335d9
SHA25626dc3851fd37f7f0a343dc660d0dabaefa35e85e100f358a98ed7ecc8a54cb88
SHA512c0e55a1fc51ae9fa293da1c351c9d2d73d8c9fe793ff1abd33bc9a940348c1c2d858c7948e56d8dbf2fda282e5dcf827e7c07f243bcd22344506f0e8f008e6af
-
C:\Users\Admin\AppData\Local\Temp\78150127edf6b95f5206fc37648c6dee4670dd803fad738abaa9e000ba612a31.exe.exe
Filesize28KB
MD5542c8af218f89a936478c2806c6ecb87
SHA14d867ebf6554cefa80481497fc183c9d387aaf4f
SHA25657d161cbc7359f488d500f53b4b13b8f3a3741d43ea2786fe88de01fc47ce8aa
SHA5129206b2ac45d251c36a6c7fad1e22797fa099696b78b65171675e1eed5b4580e973da3443ca85dd2e4bf71fc23335843266ab83b6fe12307bbff325ba760be26a
-
Filesize
40KB
MD503ebc053c8eec6b4f4afbbb5dc64b169
SHA19ed172dbce1a6a1dd20e08a9720afba210eee79c
SHA256ad25714f5c7eb2e27742b5e0886e865fc8884e8b65cb863d2aeba0c6dbff2d02
SHA51240eab99574ea6614341b869239b014a74cdc24da0c4be69681eaab18de72bbef14ad4cf36215e39eff4978b8ed074762ce25bb85a042219ac5db5cb46390e9ff