Analysis
-
max time kernel
293s -
max time network
338s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe
Resource
win10v2004-20221111-en
General
-
Target
f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe
-
Size
63KB
-
MD5
446125e165d77752ad0358d340a7f986
-
SHA1
721cd563c4d26e552551d6769e1bfb2e6463b256
-
SHA256
f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66
-
SHA512
1542f4395f2663fb8032329e6539faf46076040ffbc1c35af91078725138b2a1c4eeaad2656304459694bd85fdb91fc67ade4f9e785074578df9b25a483d13fa
-
SSDEEP
1536:6+xc+k+nh46q6wBo9zR9ECTUjhiV+11rRVomy1hVict5f:6iTxnh9UBIrTUtiV+7t6m1Kf
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 672 urdvxc.exe 4260 urdvxc.exe 1396 urdvxc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\urdvxc.exe f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe File created C:\Windows\SysWOW64\urdvxc.exe f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe -
Modifies registry class 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB2BFC4F-05E0-9B12-B78F-A255A1646254}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe" f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "chhskbenlvbsthjt" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "skecshrbshjscesl" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB2BFC4F-05E0-9B12-B78F-A255A1646254}\ = "xrtkzjwnjqltnkkq" f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB2BFC4F-05E0-9B12-B78F-A255A1646254} f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB2BFC4F-05E0-9B12-B78F-A255A1646254}\LocalServer32 f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "esrlctwhvnrsknql" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 672 urdvxc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4184 wrote to memory of 672 4184 f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe 82 PID 4184 wrote to memory of 672 4184 f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe 82 PID 4184 wrote to memory of 672 4184 f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe 82 PID 4184 wrote to memory of 4260 4184 f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe 83 PID 4184 wrote to memory of 4260 4184 f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe 83 PID 4184 wrote to memory of 4260 4184 f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe 83 PID 4184 wrote to memory of 1396 4184 f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe 84 PID 4184 wrote to memory of 1396 4184 f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe 84 PID 4184 wrote to memory of 1396 4184 f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe"C:\Users\Admin\AppData\Local\Temp\f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /installservice2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /start2⤵
- Executes dropped EXE
- Modifies registry class
PID:4260
-
-
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66.exe2⤵
- Executes dropped EXE
- Modifies registry class
PID:1396
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5446125e165d77752ad0358d340a7f986
SHA1721cd563c4d26e552551d6769e1bfb2e6463b256
SHA256f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66
SHA5121542f4395f2663fb8032329e6539faf46076040ffbc1c35af91078725138b2a1c4eeaad2656304459694bd85fdb91fc67ade4f9e785074578df9b25a483d13fa
-
Filesize
63KB
MD5446125e165d77752ad0358d340a7f986
SHA1721cd563c4d26e552551d6769e1bfb2e6463b256
SHA256f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66
SHA5121542f4395f2663fb8032329e6539faf46076040ffbc1c35af91078725138b2a1c4eeaad2656304459694bd85fdb91fc67ade4f9e785074578df9b25a483d13fa
-
Filesize
63KB
MD5446125e165d77752ad0358d340a7f986
SHA1721cd563c4d26e552551d6769e1bfb2e6463b256
SHA256f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66
SHA5121542f4395f2663fb8032329e6539faf46076040ffbc1c35af91078725138b2a1c4eeaad2656304459694bd85fdb91fc67ade4f9e785074578df9b25a483d13fa
-
Filesize
63KB
MD5446125e165d77752ad0358d340a7f986
SHA1721cd563c4d26e552551d6769e1bfb2e6463b256
SHA256f3fef6876c6b88a280a5b6163a77736e68918a9ef35782c4663158fde97afb66
SHA5121542f4395f2663fb8032329e6539faf46076040ffbc1c35af91078725138b2a1c4eeaad2656304459694bd85fdb91fc67ade4f9e785074578df9b25a483d13fa