Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 05:21
Behavioral task
behavioral1
Sample
d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe
Resource
win7-20220901-en
General
-
Target
d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe
-
Size
33KB
-
MD5
0e3aa2add5449ce1b9e488d119afb665
-
SHA1
abf19c36bdcac0ed2628fc32ca241026a7774c78
-
SHA256
d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11
-
SHA512
ff22a1fa3a6193ef973f00afcbfbdc99072945c16cbdc10af736b39da8b1caed5f1e7cc04368a80ee581ea09c9df6f236a8a45d75b262daa4c18344bb3b30e2c
-
SSDEEP
768:eeq5YtQ4NB86TQZXh4lxJhwtssxDGja6PEeiLjM:ezmC42Mit3xD0a6s7j
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral1/memory/1456-58-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1680 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1680 rundll32.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\yumidimap.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe File created C:\Windows\SysWOW64\yumsimg32.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe File created C:\Windows\SysWOW64\msimg32.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe File created C:\Windows\SysWOW64\yuksuser.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe File created C:\Windows\SysWOW64\ksuser.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe File created C:\Windows\SysWOW64\midimap.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe File created C:\Windows\SysWOW64\sysapp18.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1472 sc.exe 1696 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1524 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 26 PID 1456 wrote to memory of 1524 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 26 PID 1456 wrote to memory of 1524 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 26 PID 1456 wrote to memory of 1524 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 26 PID 1456 wrote to memory of 1696 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 27 PID 1456 wrote to memory of 1696 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 27 PID 1456 wrote to memory of 1696 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 27 PID 1456 wrote to memory of 1696 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 27 PID 1456 wrote to memory of 1472 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 30 PID 1456 wrote to memory of 1472 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 30 PID 1456 wrote to memory of 1472 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 30 PID 1456 wrote to memory of 1472 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 30 PID 1456 wrote to memory of 1680 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 32 PID 1456 wrote to memory of 1680 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 32 PID 1456 wrote to memory of 1680 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 32 PID 1456 wrote to memory of 1680 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 32 PID 1456 wrote to memory of 1680 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 32 PID 1456 wrote to memory of 1680 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 32 PID 1456 wrote to memory of 1680 1456 d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe 32 PID 1524 wrote to memory of 1376 1524 net.exe 33 PID 1524 wrote to memory of 1376 1524 net.exe 33 PID 1524 wrote to memory of 1376 1524 net.exe 33 PID 1524 wrote to memory of 1376 1524 net.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe"C:\Users\Admin\AppData\Local\Temp\d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵PID:1376
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
PID:1696
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
PID:1472
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1667839045.dat, ServerMain c:\users\admin\appdata\local\temp\d65d9653d96eb9ba9dd4025425d58b52b2d5bc0ade5eb8bea935ad1fd5d55f11.exe2⤵
- Deletes itself
- Loads dropped DLL
PID:1680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD503260eb5e3dfc791e039258e25242746
SHA129ad115e35dc6b27fd5f2296048d2336b76fe4bd
SHA25603558ce6644a8e36115724c70edd24713a8bbd79832861e880a0a53333ef32de
SHA5123e64f0852347bd796c779232cfdd9490516642b2cca818d96a7d4fe58e2e4510f86cc233cb08ad127b9cfd51cf7a5076456e5ed17e583b2827588eb327c1c51a
-
Filesize
33KB
MD503260eb5e3dfc791e039258e25242746
SHA129ad115e35dc6b27fd5f2296048d2336b76fe4bd
SHA25603558ce6644a8e36115724c70edd24713a8bbd79832861e880a0a53333ef32de
SHA5123e64f0852347bd796c779232cfdd9490516642b2cca818d96a7d4fe58e2e4510f86cc233cb08ad127b9cfd51cf7a5076456e5ed17e583b2827588eb327c1c51a