Analysis
-
max time kernel
106s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 09:37
Static task
static1
Behavioral task
behavioral1
Sample
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe
Resource
win10v2004-20220901-en
General
-
Target
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe
-
Size
329KB
-
MD5
0922b6822bf9de45f4ba68a936557c30
-
SHA1
a9aba947f9bd21d6e0aa861643e974ab7e54162a
-
SHA256
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9
-
SHA512
74bef007a2b7927002f866c942838e23ed65286063b14d2786d90aa21ef3564ee7ac0ebe132e339ad102545e5820395792cd0713d575ff70448a334c61868431
-
SSDEEP
6144:uqpxvlACym6wGGWFGDwZyoJ3fzBeM6SpktqHQI6mVk8cL3/CzYjsHh:uqjvlA06wLBHAf9eMvHwmVkhL36zYwHh
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process File created C:\Windows\SysWOW64\drivers\2559f384.sys ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 4036 takeown.exe 3480 icacls.exe 3516 takeown.exe 2236 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\2559f384\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\2559f384.sys" ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 3516 takeown.exe 2236 icacls.exe 4036 takeown.exe 3480 icacls.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Drops file in System32 directory 4 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process File created C:\Windows\SysWOW64\ws2tcpip.dll ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe File opened for modification C:\Windows\SysWOW64\ws2tcpip.dll ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe File created C:\Windows\SysWOW64\wshtcpip.dll ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe File created C:\Windows\SysWOW64\midimap.dll ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Modifies registry class 4 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\HOOK_ID ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\HOOK_ID\name = "ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe" ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\SYS_DLL ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\SYS_DLL\name = "Guhy74ue.dll" ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exepid process 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exepid process 672 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exetakeown.exetakeown.exedescription pid process Token: SeDebugPrivilege 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe Token: SeTakeOwnershipPrivilege 3516 takeown.exe Token: SeTakeOwnershipPrivilege 4036 takeown.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.execmd.execmd.exedescription pid process target process PID 2324 wrote to memory of 936 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 2324 wrote to memory of 936 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 2324 wrote to memory of 936 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 936 wrote to memory of 3516 936 cmd.exe takeown.exe PID 936 wrote to memory of 3516 936 cmd.exe takeown.exe PID 936 wrote to memory of 3516 936 cmd.exe takeown.exe PID 936 wrote to memory of 2236 936 cmd.exe icacls.exe PID 936 wrote to memory of 2236 936 cmd.exe icacls.exe PID 936 wrote to memory of 2236 936 cmd.exe icacls.exe PID 2324 wrote to memory of 1120 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 2324 wrote to memory of 1120 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 2324 wrote to memory of 1120 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 1120 wrote to memory of 4036 1120 cmd.exe takeown.exe PID 1120 wrote to memory of 4036 1120 cmd.exe takeown.exe PID 1120 wrote to memory of 4036 1120 cmd.exe takeown.exe PID 1120 wrote to memory of 3480 1120 cmd.exe icacls.exe PID 1120 wrote to memory of 3480 1120 cmd.exe icacls.exe PID 1120 wrote to memory of 3480 1120 cmd.exe icacls.exe PID 2324 wrote to memory of 4952 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 2324 wrote to memory of 4952 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe PID 2324 wrote to memory of 4952 2324 ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe"C:\Users\Admin\AppData\Local\Temp\ed7dc6ad15102dc742658be78b7076f5f8d0b27c64c9c6c80eda8d79dc14c2f9.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F2⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\wshtcpip.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\midimap.dll && icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F2⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\midimap.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat2⤵PID:4952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD509a1b336263a6be0f75aecb88b71cca5
SHA159fb1c57ed4b625355d5b9b56de65bea10f4affb
SHA256ff2359eb4e915d7cbfe588571802150d7da1941a47bb73540f0e9e20945e9546
SHA5126d9da08772b2b7b9eabbc69bf9de1017a8cb4688d4dc479d24855ad0162a7cba0d18e78b72175a481e278448b0f77f05f1c03c7fdb6c7ac75889591256b387ea