Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:04
Static task
static1
Behavioral task
behavioral1
Sample
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe
Resource
win7-20221111-en
General
-
Target
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe
-
Size
184KB
-
MD5
a1608b21962b1fef1e87948753a8d3d2
-
SHA1
3215288dd5ecf93b00cee7cb5670966e8f44cfb0
-
SHA256
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6
-
SHA512
efeaf181ebfd6c342e513691db4948e024f02b701de63f2bd620bcf546b4678a9041a3245086091d48bab2bbe736f9763621a3f85b55a5da4fc5810b7b3ccdc9
-
SSDEEP
3072:84r0/5Q3FosIbwKkD07DeDrVBRpg5uJBm0RcOIJ8z:84QRGFqMh07DeD9pg5mB/2OIJ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
servicesc.exepid process 656 servicesc.exe -
Loads dropped DLL 2 IoCs
Processes:
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exepid process 1348 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe 1348 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe -
Processes:
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
servicesc.exepid process 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe 656 servicesc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1168 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1168 AUDIODG.EXE Token: 33 1168 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1168 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exeservicesc.exepid process 1348 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe 1348 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe 1348 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe 656 servicesc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exedescription pid process target process PID 1348 wrote to memory of 656 1348 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe servicesc.exe PID 1348 wrote to memory of 656 1348 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe servicesc.exe PID 1348 wrote to memory of 656 1348 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe servicesc.exe PID 1348 wrote to memory of 656 1348 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe servicesc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe"C:\Users\Admin\AppData\Local\Temp\570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\servicesc.exeC:\Users\Admin\AppData\Local\Temp\servicesc.exe 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:656
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5681⤵
- Suspicious use of AdjustPrivilegeToken
PID:1168
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5d542fd20caac2c34bbec498c05b0d828
SHA15deb07503e212e23e1f6d23b7fd93289da20061f
SHA256d74fca83e5cf20d9081e099a12e9c70d8c6ecaf52f4ec2963246353dc447b666
SHA5120e853a822008229b81a89ebc80d0d7beef08c45471cf4a2d6eb12aa1e19d56c96b6f7ae18f49cc2c317941b2a1c18be6211e8447b22eb5498dbcd17a8ea5c78b
-
Filesize
32KB
MD5d542fd20caac2c34bbec498c05b0d828
SHA15deb07503e212e23e1f6d23b7fd93289da20061f
SHA256d74fca83e5cf20d9081e099a12e9c70d8c6ecaf52f4ec2963246353dc447b666
SHA5120e853a822008229b81a89ebc80d0d7beef08c45471cf4a2d6eb12aa1e19d56c96b6f7ae18f49cc2c317941b2a1c18be6211e8447b22eb5498dbcd17a8ea5c78b
-
Filesize
32KB
MD5d542fd20caac2c34bbec498c05b0d828
SHA15deb07503e212e23e1f6d23b7fd93289da20061f
SHA256d74fca83e5cf20d9081e099a12e9c70d8c6ecaf52f4ec2963246353dc447b666
SHA5120e853a822008229b81a89ebc80d0d7beef08c45471cf4a2d6eb12aa1e19d56c96b6f7ae18f49cc2c317941b2a1c18be6211e8447b22eb5498dbcd17a8ea5c78b