Analysis
-
max time kernel
154s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe
Resource
win10v2004-20220812-en
General
-
Target
ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe
-
Size
444KB
-
MD5
53880143631f47c73526dbcb91831198
-
SHA1
821ae3f70f4697a7c426cccf48914ed76adb15d5
-
SHA256
ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a
-
SHA512
6d39d98c3a566bee09cd879dbef74fef41cf9a360c5ae8884de4ae8e6109dadc238005d975021bbeddfe73e38a45fd82f5aaa35572ca3363c87052a5e15e8239
-
SSDEEP
6144:LY1Y+aAywEnRnei/wK9N58K5rRzZ4aPm2sJKiUY:LGrywkneiICNR5pC41
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" vbc.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe -
Executes dropped EXE 1 IoCs
pid Process 4752 lsass.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4296 netsh.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Config = "C:\\Users\\Admin\\AppData\\Local\\Temp\\msconfig.exe" ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1664 set thread context of 2180 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 80 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe lsass.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 5028 dw20.exe Token: SeBackupPrivilege 5028 dw20.exe Token: SeBackupPrivilege 5028 dw20.exe Token: SeBackupPrivilege 5028 dw20.exe Token: SeBackupPrivilege 5028 dw20.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 vbc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2180 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 80 PID 1664 wrote to memory of 2180 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 80 PID 1664 wrote to memory of 2180 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 80 PID 1664 wrote to memory of 2180 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 80 PID 1664 wrote to memory of 2180 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 80 PID 1664 wrote to memory of 2180 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 80 PID 1664 wrote to memory of 2180 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 80 PID 1664 wrote to memory of 2180 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 80 PID 1664 wrote to memory of 5028 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 81 PID 1664 wrote to memory of 5028 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 81 PID 1664 wrote to memory of 5028 1664 ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe 81 PID 2180 wrote to memory of 4296 2180 vbc.exe 82 PID 2180 wrote to memory of 4296 2180 vbc.exe 82 PID 2180 wrote to memory of 4296 2180 vbc.exe 82 PID 2180 wrote to memory of 4752 2180 vbc.exe 84 PID 2180 wrote to memory of 4752 2180 vbc.exe 84 PID 2180 wrote to memory of 4752 2180 vbc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe"C:\Users\Admin\AppData\Local\Temp\ef17e6c12998899420d6cac9ad16c64e490e156e7041577c7e94be740324f34a.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\lsass.exe" CityScape Enable3⤵
- Modifies Windows Firewall
PID:4296
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe/d C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4752
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9242⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a0776a06c68c2759e639ecc05099b3d3
SHA1afb581b876abdd5e9723b941be50996226201af3
SHA256514d43ac00ef9e08ad6fcd3dc282a321cf84801221eb028990a08e2209169574
SHA512bb43b2b66542bccfb38029514c23b445571d2375e814aaaaaee79891b0dc439e831608bc58192d34f90c2b66b6c36cda503c934baae6aa34d21c415c67436b76
-
Filesize
1.1MB
MD5a0776a06c68c2759e639ecc05099b3d3
SHA1afb581b876abdd5e9723b941be50996226201af3
SHA256514d43ac00ef9e08ad6fcd3dc282a321cf84801221eb028990a08e2209169574
SHA512bb43b2b66542bccfb38029514c23b445571d2375e814aaaaaee79891b0dc439e831608bc58192d34f90c2b66b6c36cda503c934baae6aa34d21c415c67436b76