Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-11-2022 05:03
Static task
static1
Behavioral task
behavioral1
Sample
aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe
Resource
win10v2004-20220901-en
General
-
Target
aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe
-
Size
344KB
-
MD5
14a20867d0d6519be768b17ad3cefefe
-
SHA1
c955e587f0f84df8cfd27b23f70be1de11253b29
-
SHA256
aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3
-
SHA512
69b50b95e59ccd2e19577e22560edff5d63c844558b05456481c83d7678dff50a99798ff7132b0aeb728795f14fe77222096a3b5e2296fdb80b95ca310f2807e
-
SSDEEP
6144:RerQu7SGFRDauuLk8fk3tdG2smOOHhmlbobTfCF9NRRya6AE7Gya6AE:UcKSyQ2dBhhmlbot
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{9AF9AF3D-F414-4370-8F12-36313A2E5ADA}\\f5ea51da.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{9AF9AF3D-F414-4370-8F12-36313A2E5ADA}\\f5ea51da.exe" svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe -
Suspicious behavior: MapViewOfSection 26 IoCs
Processes:
aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exesvchost.exepid process 1992 aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe 1992 aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe 1720 svchost.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeRestorePrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeSystemtimePrivilege 880 Token: SeBackupPrivilege 880 Token: SeRestorePrivilege 880 Token: SeShutdownPrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeUndockPrivilege 880 Token: SeManageVolumePrivilege 880 Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeRestorePrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeRestorePrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeAuditPrivilege 880 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1224 1224 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1224 1224 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exepid process 1992 aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe -
Suspicious use of UnmapMainImage 5 IoCs
Processes:
aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exepid process 1992 aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe 816 816 816 816 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exedescription pid process target process PID 1992 wrote to memory of 1720 1992 aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe svchost.exe PID 1992 wrote to memory of 1720 1992 aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe svchost.exe PID 1992 wrote to memory of 1720 1992 aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe svchost.exe PID 1992 wrote to memory of 1720 1992 aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe"C:\Users\Admin\AppData\Local\Temp\aa368679c530fc2019fe5467eb973a17c4b37c395288781b0a32c20e40a360d3.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/260-73-0x0000000000110000-0x0000000000115000-memory.dmpFilesize
20KB
-
memory/296-79-0x0000000000B60000-0x0000000000B65000-memory.dmpFilesize
20KB
-
memory/336-71-0x0000000001F00000-0x0000000001F05000-memory.dmpFilesize
20KB
-
memory/372-69-0x0000000000250000-0x0000000000255000-memory.dmpFilesize
20KB
-
memory/384-70-0x0000000000210000-0x0000000000215000-memory.dmpFilesize
20KB
-
memory/420-72-0x0000000000050000-0x0000000000055000-memory.dmpFilesize
20KB
-
memory/468-74-0x0000000000180000-0x0000000000185000-memory.dmpFilesize
20KB
-
memory/476-75-0x0000000000190000-0x0000000000195000-memory.dmpFilesize
20KB
-
memory/484-77-0x0000000000100000-0x0000000000105000-memory.dmpFilesize
20KB
-
memory/600-83-0x0000000000520000-0x0000000000525000-memory.dmpFilesize
20KB
-
memory/676-84-0x00000000003C0000-0x00000000003C5000-memory.dmpFilesize
20KB
-
memory/760-85-0x0000000000900000-0x0000000000905000-memory.dmpFilesize
20KB
-
memory/816-78-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/856-86-0x00000000006A0000-0x00000000006A5000-memory.dmpFilesize
20KB
-
memory/880-87-0x0000000000930000-0x0000000000935000-memory.dmpFilesize
20KB
-
memory/1028-88-0x0000000000190000-0x0000000000195000-memory.dmpFilesize
20KB
-
memory/1076-89-0x0000000000090000-0x0000000000095000-memory.dmpFilesize
20KB
-
memory/1132-80-0x0000000000210000-0x0000000000215000-memory.dmpFilesize
20KB
-
memory/1184-90-0x0000000000330000-0x0000000000335000-memory.dmpFilesize
20KB
-
memory/1224-81-0x0000000002190000-0x0000000002195000-memory.dmpFilesize
20KB
-
memory/1252-93-0x0000000000120000-0x0000000000125000-memory.dmpFilesize
20KB
-
memory/1632-91-0x00000000007E0000-0x00000000007E5000-memory.dmpFilesize
20KB
-
memory/1720-68-0x00000000000D0000-0x00000000000D5000-memory.dmpFilesize
20KB
-
memory/1720-67-0x0000000000E20000-0x0000000000E28000-memory.dmpFilesize
32KB
-
memory/1720-63-0x0000000000000000-mapping.dmp
-
memory/1720-66-0x0000000010000000-0x0000000010015000-memory.dmpFilesize
84KB
-
memory/1720-76-0x0000000000AD0000-0x0000000000C94000-memory.dmpFilesize
1.8MB
-
memory/1908-92-0x0000000000100000-0x0000000000105000-memory.dmpFilesize
20KB
-
memory/1992-60-0x0000000000400000-0x0000000000445000-memory.dmpFilesize
276KB
-
memory/1992-56-0x0000000074F01000-0x0000000074F03000-memory.dmpFilesize
8KB
-
memory/1992-65-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/2020-82-0x0000000000100000-0x0000000000105000-memory.dmpFilesize
20KB