Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2022 08:45
Static task
static1
Behavioral task
behavioral1
Sample
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe
Resource
win10v2004-20221111-en
General
-
Target
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe
-
Size
328KB
-
MD5
1418bc22e59199f408628e641f1c9780
-
SHA1
78b1d9a4f475ee201a939173940c564c50e782b6
-
SHA256
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d
-
SHA512
b0b2c75cedaecd48b1d24cf8f555db9c01cc55e8236a708cb132a98407816514c1940b9502db3c1de716065561536fe8e1a42b667e20a817d8d87858314ae01d
-
SSDEEP
6144:pyWOeLm+tkxoGQvT+W4+HMc+MEGRQ6saHSMf3z0AzbLUG50Tpm+MmvbWdlL0d5aU:pCemx0vN3HKGi6sYjJLUGGtedud5tr7
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exedescription ioc process File created C:\Windows\SysWOW64\drivers\6482aa0c.sys 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 1796 takeown.exe 1400 icacls.exe 3992 takeown.exe 776 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\6482aa0c\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\6482aa0c.sys" 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 1796 takeown.exe 1400 icacls.exe 3992 takeown.exe 776 icacls.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe -
Drops file in System32 directory 4 IoCs
Processes:
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ws2tcpip.dll 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe File created C:\Windows\SysWOW64\wshtcpip.dll 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe File created C:\Windows\SysWOW64\midimap.dll 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe File created C:\Windows\SysWOW64\ws2tcpip.dll 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe -
Modifies registry class 4 IoCs
Processes:
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\SYS_DLL\name = "HFDBegD.dll" 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\HOOK_ID 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\HOOK_ID\name = "564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe" 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\SYS_DLL 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exepid process 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exepid process 660 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exetakeown.exetakeown.exedescription pid process Token: SeDebugPrivilege 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe Token: SeTakeOwnershipPrivilege 1796 takeown.exe Token: SeTakeOwnershipPrivilege 3992 takeown.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.execmd.execmd.exedescription pid process target process PID 3472 wrote to memory of 2104 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe cmd.exe PID 3472 wrote to memory of 2104 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe cmd.exe PID 3472 wrote to memory of 2104 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe cmd.exe PID 2104 wrote to memory of 1796 2104 cmd.exe takeown.exe PID 2104 wrote to memory of 1796 2104 cmd.exe takeown.exe PID 2104 wrote to memory of 1796 2104 cmd.exe takeown.exe PID 2104 wrote to memory of 1400 2104 cmd.exe icacls.exe PID 2104 wrote to memory of 1400 2104 cmd.exe icacls.exe PID 2104 wrote to memory of 1400 2104 cmd.exe icacls.exe PID 3472 wrote to memory of 5028 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe cmd.exe PID 3472 wrote to memory of 5028 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe cmd.exe PID 3472 wrote to memory of 5028 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe cmd.exe PID 5028 wrote to memory of 3992 5028 cmd.exe takeown.exe PID 5028 wrote to memory of 3992 5028 cmd.exe takeown.exe PID 5028 wrote to memory of 3992 5028 cmd.exe takeown.exe PID 5028 wrote to memory of 776 5028 cmd.exe icacls.exe PID 5028 wrote to memory of 776 5028 cmd.exe icacls.exe PID 5028 wrote to memory of 776 5028 cmd.exe icacls.exe PID 3472 wrote to memory of 3828 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe cmd.exe PID 3472 wrote to memory of 3828 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe cmd.exe PID 3472 wrote to memory of 3828 3472 564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe"C:\Users\Admin\AppData\Local\Temp\564d4d591fbee72741120aad1d61e91afc4a7fed095b7f6acadfe254face5e3d.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\wshtcpip.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1796 -
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1400 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\midimap.dll && icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F2⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\midimap.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3992 -
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat2⤵PID:3828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ahnmove.batFilesize
181B
MD5b3a43b7d59456adcd5c5a485b86b1859
SHA1f93a902c2d82acb763d9b9e2e789fe4c4b7b7123
SHA2569f87f425f1801fb9d0cd988d7d4467f2ff512cc885ee08a65a33575050fc0e85
SHA5124a92cbafa5f7622d6c5ad6515f003a00af0be6a2973d81ef43847059a8e7d176c9cb2bd17a9db560b6db25f882b53e7cb7ff62d5c92fd455469c4a9d3d83545c
-
memory/776-141-0x0000000000000000-mapping.dmp
-
memory/1400-138-0x0000000000000000-mapping.dmp
-
memory/1796-137-0x0000000000000000-mapping.dmp
-
memory/2104-136-0x0000000000000000-mapping.dmp
-
memory/3472-135-0x0000000000590000-0x00000000005B0000-memory.dmpFilesize
128KB
-
memory/3472-132-0x0000000001000000-0x000000000116A000-memory.dmpFilesize
1.4MB
-
memory/3472-134-0x0000000001000000-0x000000000116A000-memory.dmpFilesize
1.4MB
-
memory/3472-143-0x0000000001000000-0x000000000116A000-memory.dmpFilesize
1.4MB
-
memory/3472-133-0x0000000000590000-0x00000000005B0000-memory.dmpFilesize
128KB
-
memory/3828-142-0x0000000000000000-mapping.dmp
-
memory/3992-140-0x0000000000000000-mapping.dmp
-
memory/5028-139-0x0000000000000000-mapping.dmp