Analysis
-
max time kernel
65s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 05:29
Behavioral task
behavioral1
Sample
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe
Resource
win7-20220812-en
General
-
Target
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe
-
Size
350KB
-
MD5
0d1afcba9798b04f1f8cb790f01a3300
-
SHA1
fa57ea84af2a380c493d30830118c80e8f2bbc09
-
SHA256
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192
-
SHA512
6eefa29448c6c1ae2139088be9e08d3c82f362f2aba5efbcb273109104eb5b7623dec71edc5b26e07717a8b12aa69a5610353b9da3d1c126ee1d685cdcc095f0
-
SSDEEP
6144:gyXu7IEBSsQ9ElMwm60lmqs7MTRGA3h3GVqdppJXEGhBukJF/KAwxFUOWdEmh:g3BdQLL4BE93NGVYZX9BukJlwxSJdEm
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exedescription ioc process File created C:\Windows\SysWOW64\drivers\61db835b.sys a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe File created C:\Windows\SysWOW64\drivers\1d70b6dd.sys a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 520 takeown.exe 632 icacls.exe -
Sets service image path in registry 2 TTPs 2 IoCs
Processes:
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\61db835b\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\61db835b.sys" a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\1d70b6dd\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\1d70b6dd.sys" a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe -
Processes:
resource yara_rule behavioral1/memory/604-55-0x0000000001000000-0x000000000112D000-memory.dmp upx behavioral1/memory/604-56-0x0000000001000000-0x000000000112D000-memory.dmp upx behavioral1/memory/604-61-0x0000000001000000-0x000000000112D000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 980 cmd.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 520 takeown.exe 632 icacls.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe -
Drops file in System32 directory 5 IoCs
Processes:
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exedescription ioc process File created C:\Windows\SysWOW64\ws2tcpip.dll a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe File opened for modification C:\Windows\SysWOW64\ws2tcpip.dll a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe File created C:\Windows\SysWOW64\wshtcpip.dll a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe File opened for modification C:\Windows\SysWOW64\goodsb.dll a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe File created C:\Windows\SysWOW64\goodsb.dll a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe -
Modifies registry class 4 IoCs
Processes:
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\HOOK_ID\name = "a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe" a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\SYS_DLL a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\SYS_DLL\name = "uGAagedFHB.dll" a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\HOOK_ID a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exepid process 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe -
Suspicious behavior: LoadsDriver 5 IoCs
Processes:
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exepid process 460 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 460 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exetakeown.exedescription pid process Token: SeDebugPrivilege 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe Token: SeTakeOwnershipPrivilege 520 takeown.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.execmd.exedescription pid process target process PID 604 wrote to memory of 1116 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe cmd.exe PID 604 wrote to memory of 1116 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe cmd.exe PID 604 wrote to memory of 1116 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe cmd.exe PID 604 wrote to memory of 1116 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe cmd.exe PID 1116 wrote to memory of 520 1116 cmd.exe takeown.exe PID 1116 wrote to memory of 520 1116 cmd.exe takeown.exe PID 1116 wrote to memory of 520 1116 cmd.exe takeown.exe PID 1116 wrote to memory of 520 1116 cmd.exe takeown.exe PID 1116 wrote to memory of 632 1116 cmd.exe icacls.exe PID 1116 wrote to memory of 632 1116 cmd.exe icacls.exe PID 1116 wrote to memory of 632 1116 cmd.exe icacls.exe PID 1116 wrote to memory of 632 1116 cmd.exe icacls.exe PID 604 wrote to memory of 980 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe cmd.exe PID 604 wrote to memory of 980 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe cmd.exe PID 604 wrote to memory of 980 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe cmd.exe PID 604 wrote to memory of 980 604 a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe"C:\Users\Admin\AppData\Local\Temp\a477ea187d43cea91a5bcfb5e2d6609d192c29b0f8dc2979a2096986bba88192.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F2⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\wshtcpip.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat2⤵
- Deletes itself
PID:980
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD5c951a3fe039aae120705d7b2f4309f51
SHA1ae1a6c806813300217af9deacee87786b74a62b2
SHA256a048318e37035649c55a3a7d8ae31899bbcdca8ce1b11d4b5a3581c7007e0563
SHA512ab1e4b7a167b24eda8a36ec6c2522925c3b88d3c5e7e0ef665b280e3cfd634227d333c1ba0e70ab0370f9aea1f6c8d346c6743f2604e5dd261dd5dc1edffc6b9