Analysis
-
max time kernel
68s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe
Resource
win10v2004-20220812-en
General
-
Target
794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe
-
Size
125KB
-
MD5
0d877e5596148ea2518276010d825392
-
SHA1
6673b830650834db609dbcaff8c6bedb77bd701e
-
SHA256
794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c
-
SHA512
16fcd229c5bc7f8a5ddb1096b6169581ee3efee203b8a027f0ba914d4796d6b5aaa418e83f90a862f530d838c0be8861a394a2496b8a4a3bea1a52f85bb4c9eb
-
SSDEEP
3072:T3tNkPGemOiwVn8ixLBlzies0k1NLYMm6oa+mUpsW:Td4mOpthY1lYMBGp
Malware Config
Signatures
-
Modifies security service 2 TTPs 4 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Parameters 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Security 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo\0 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe -
Executes dropped EXE 2 IoCs
pid Process 1264 Explorer.EXE 464 services.exe -
Registers COM server for autorun 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ThreadingModel = "Both" 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-21-2292972927-2705560509-2768824231-1000\\$a31e499c3c7c222a40fd7fc6e142514c\\n." 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-18\\$a31e499c3c7c222a40fd7fc6e142514c\\n." 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe -
Unexpected DNS network traffic destination 9 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini services.exe File created \systemroot\assembly\GAC_32\Desktop.ini services.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2004 set thread context of 1888 2004 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 28 PID 2004 set thread context of 1888 2004 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 28 PID 2004 set thread context of 1888 2004 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 28 -
Drops file in Program Files directory 18 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\en-US:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\it-IT:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\de-DE:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\fr-FR:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\ja-JP:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\es-ES:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-21-2292972927-2705560509-2768824231-1000\\$a31e499c3c7c222a40fd7fc6e142514c\\n." 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-18\\$a31e499c3c7c222a40fd7fc6e142514c\\n." 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\clsid 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ThreadingModel = "Both" 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe -
NTFS ADS 18 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\es-ES:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\it-IT:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\ja-JP:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\en-US:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\de-DE:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\fr-FR:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll:! 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 464 services.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2004 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Token: SeDebugPrivilege 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Token: SeDebugPrivilege 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe Token: SeDebugPrivilege 464 services.exe Token: SeBackupPrivilege 464 services.exe Token: SeRestorePrivilege 464 services.exe Token: SeSecurityPrivilege 464 services.exe Token: SeTakeOwnershipPrivilege 464 services.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1264 Explorer.EXE 1264 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1264 Explorer.EXE 1264 Explorer.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1888 2004 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 28 PID 2004 wrote to memory of 1888 2004 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 28 PID 2004 wrote to memory of 1888 2004 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 28 PID 2004 wrote to memory of 1888 2004 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 28 PID 1888 wrote to memory of 1264 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 17 PID 1888 wrote to memory of 1264 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 17 PID 1888 wrote to memory of 464 1888 794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe 2
Processes
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464
-
C:\Users\Admin\AppData\Local\Temp\794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe"C:\Users\Admin\AppData\Local\Temp\794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe"C:\Users\Admin\AppData\Local\Temp\794129e6525495a01d888ac4f03378fc6dc7f48abf842c1af7dd455a201ac49c.exe"2⤵
- Modifies security service
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a6740d1cc56425cde11a0992051bedaa
SHA104ce0192323b8919c91d128b135d02d9715c4279
SHA25635b457a5dba3c252191718660e3dc8c164976e22db6446f2539d37b6ecedba16
SHA5121fa2ba780d74ee09442d3504249d738bdd556ab28407d3416ea95ce635c2ba78172358a3b0e77d5909072c0164e9172173429fc9459969b7b9bffc84d5f4d355
-
Filesize
41KB
MD5fb4e3236959152a057bc6b7603c538ef
SHA1b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4
SHA2568244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0
SHA512993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2
-
Filesize
41KB
MD5fb4e3236959152a057bc6b7603c538ef
SHA1b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4
SHA2568244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0
SHA512993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2
-
Filesize
41KB
MD5fb4e3236959152a057bc6b7603c538ef
SHA1b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4
SHA2568244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0
SHA512993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2
-
Filesize
41KB
MD5fb4e3236959152a057bc6b7603c538ef
SHA1b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4
SHA2568244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0
SHA512993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2