Analysis
-
max time kernel
61s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 09:37
Static task
static1
Behavioral task
behavioral1
Sample
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe
Resource
win10v2004-20220901-en
General
-
Target
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe
-
Size
329KB
-
MD5
0922b6822bf9de45f4ba68a936557c30
-
SHA1
a9aba947f9bd21d6e0aa861643e974ab7e54162a
-
SHA256
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9
-
SHA512
74bef007a2b7927002f866c942838e23ed65286063b14d2786d90aa21ef3564ee7ac0ebe132e339ad102545e5820395792cd0713d575ff70448a334c61868431
-
SSDEEP
6144:uqpxvlACym6wGGWFGDwZyoJ3fzBeM6SpktqHQI6mVk8cL3/CzYjsHh:uqjvlA06wLBHAf9eMvHwmVkhL36zYwHh
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process File created C:\Windows\SysWOW64\drivers\4ab87cbe.sys ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 1912 takeown.exe 436 icacls.exe 1592 takeown.exe 776 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\4ab87cbe\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\4ab87cbe.sys" ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1780 cmd.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exepid process 436 icacls.exe 1592 takeown.exe 776 icacls.exe 1912 takeown.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Drops file in System32 directory 4 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process File created C:\Windows\SysWOW64\ws2tcpip.dll ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe File opened for modification C:\Windows\SysWOW64\ws2tcpip.dll ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe File created C:\Windows\SysWOW64\wshtcpip.dll ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe File created C:\Windows\SysWOW64\midimap.dll ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Modifies registry class 4 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\HOOK_ID ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\HOOK_ID\name = "ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe" ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\SYS_DLL ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\SYS_DLL\name = "Vy8t7W.dll" ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exepid process 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exepid process 468 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exetakeown.exetakeown.exedescription pid process Token: SeDebugPrivilege 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Token: SeTakeOwnershipPrivilege 1912 takeown.exe Token: SeTakeOwnershipPrivilege 1592 takeown.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.execmd.execmd.exedescription pid process target process PID 1632 wrote to memory of 588 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1632 wrote to memory of 588 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1632 wrote to memory of 588 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1632 wrote to memory of 588 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 588 wrote to memory of 1912 588 cmd.exe takeown.exe PID 588 wrote to memory of 1912 588 cmd.exe takeown.exe PID 588 wrote to memory of 1912 588 cmd.exe takeown.exe PID 588 wrote to memory of 1912 588 cmd.exe takeown.exe PID 588 wrote to memory of 436 588 cmd.exe icacls.exe PID 588 wrote to memory of 436 588 cmd.exe icacls.exe PID 588 wrote to memory of 436 588 cmd.exe icacls.exe PID 588 wrote to memory of 436 588 cmd.exe icacls.exe PID 1632 wrote to memory of 1152 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1632 wrote to memory of 1152 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1632 wrote to memory of 1152 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1632 wrote to memory of 1152 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1152 wrote to memory of 1592 1152 cmd.exe takeown.exe PID 1152 wrote to memory of 1592 1152 cmd.exe takeown.exe PID 1152 wrote to memory of 1592 1152 cmd.exe takeown.exe PID 1152 wrote to memory of 1592 1152 cmd.exe takeown.exe PID 1152 wrote to memory of 776 1152 cmd.exe icacls.exe PID 1152 wrote to memory of 776 1152 cmd.exe icacls.exe PID 1152 wrote to memory of 776 1152 cmd.exe icacls.exe PID 1152 wrote to memory of 776 1152 cmd.exe icacls.exe PID 1632 wrote to memory of 1780 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1632 wrote to memory of 1780 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1632 wrote to memory of 1780 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1632 wrote to memory of 1780 1632 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe"C:\Users\Admin\AppData\Local\Temp\ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F2⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\wshtcpip.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:436
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\midimap.dll && icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F2⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\midimap.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat2⤵
- Deletes itself
PID:1780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD509a1b336263a6be0f75aecb88b71cca5
SHA159fb1c57ed4b625355d5b9b56de65bea10f4affb
SHA256ff2359eb4e915d7cbfe588571802150d7da1941a47bb73540f0e9e20945e9546
SHA5126d9da08772b2b7b9eabbc69bf9de1017a8cb4688d4dc479d24855ad0162a7cba0d18e78b72175a481e278448b0f77f05f1c03c7fdb6c7ac75889591256b387ea