Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe
Resource
win10v2004-20220812-en
General
-
Target
6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe
-
Size
167KB
-
MD5
480617cdb358533aa5d6f679dba14c75
-
SHA1
02e01a1ecdd509976d68853c466b18828fe460f3
-
SHA256
6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e
-
SHA512
b1320e1a1b0e8104986691436f4932ae75e00e25afdc969197509ff56316132cea0cc133d11ad4fc4c0242a7823f91743e94645207f99c1287e419669c5eb088
-
SSDEEP
3072:kHzxDIlNXHiuseOxn9jtaVDTBssxJunHddjaWnW4/EHyuDgbm2CjKJsvf:G6XHZOha5CsxJun7bSfgbxC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 Explorer.EXE -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ThreadingModel = "Both" 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-21-2891029575-1462575-1165213807-1000\\$2044bf79846b6002d22d675c414e0021\\n." 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe -
Deletes itself 1 IoCs
pid Process 3620 cmd.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.165.17.3 Destination IP 194.165.17.3 Destination IP 194.165.17.3 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 194.165.17.3 Destination IP 66.85.130.234 Destination IP 194.165.17.3 Destination IP 66.85.130.234 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4264 set thread context of 3620 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 80 -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ThreadingModel = "Both" 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-21-2891029575-1462575-1165213807-1000\\$2044bf79846b6002d22d675c414e0021\\n." 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\clsid 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe Token: SeDebugPrivilege 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe Token: SeDebugPrivilege 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4264 wrote to memory of 3032 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 47 PID 4264 wrote to memory of 3032 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 47 PID 4264 wrote to memory of 3620 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 80 PID 4264 wrote to memory of 3620 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 80 PID 4264 wrote to memory of 3620 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 80 PID 4264 wrote to memory of 3620 4264 6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe 80
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe"C:\Users\Admin\AppData\Local\Temp\6cdacca78b85e2645d17e3fbd8b76c7ccba38db4c018179aa0a283c7058a956e.exe"2⤵
- Registers COM server for autorun
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Deletes itself
PID:3620
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD59e0cd37b6d0809cf7d5fa5b521538d0d
SHA1411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2
SHA25655d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2
SHA512b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5
-
Filesize
25KB
MD59e0cd37b6d0809cf7d5fa5b521538d0d
SHA1411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2
SHA25655d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2
SHA512b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5