Analysis
-
max time kernel
129s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:52
Static task
static1
Behavioral task
behavioral1
Sample
a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe
Resource
win10v2004-20221111-en
General
-
Target
a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe
-
Size
213KB
-
MD5
928452174f5067a712cc36846701686a
-
SHA1
f80242df914a1c5594d46eda37dbffdedfb27aca
-
SHA256
a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58
-
SHA512
dba10ca48fb1c49794cd6fd5c8f403583ec71fbf3a677307a4e4ab256cc4992e5317951cd3c082b86dbd135fbd5ed016af0a0b9bf8be7e7cfeaa3829da88d6fd
-
SSDEEP
3072:aL5inVsD8cnLLEgoAMf2SsxmwEirbPVAGO7/9Op/kRLCflPFIWpmnQR6L/mDUDeN:aL5YaLYdiDZegoCflPmnQ8mDN
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
Processes:
a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-487580275876824076547\winsvc.exe = "C:\\Users\\Admin\\M-487580275876824076547\\winsvc.exe:*:Enabled:Microsoft Service" a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe -
Executes dropped EXE 2 IoCs
Processes:
winsvc.exewinsvc.exepid process 1744 winsvc.exe 1724 winsvc.exe -
Loads dropped DLL 1 IoCs
Processes:
a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exepid process 804 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Service = "C:\\Users\\Admin\\M-487580275876824076547\\winsvc.exe" a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exewinsvc.exedescription pid process target process PID 980 set thread context of 804 980 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe PID 1744 set thread context of 1724 1744 winsvc.exe winsvc.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exewinsvc.exepid process 980 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe 980 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe 1744 winsvc.exe 1744 winsvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exea43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exewinsvc.exedescription pid process target process PID 980 wrote to memory of 804 980 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe PID 980 wrote to memory of 804 980 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe PID 980 wrote to memory of 804 980 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe PID 980 wrote to memory of 804 980 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe PID 804 wrote to memory of 1744 804 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe winsvc.exe PID 804 wrote to memory of 1744 804 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe winsvc.exe PID 804 wrote to memory of 1744 804 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe winsvc.exe PID 804 wrote to memory of 1744 804 a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe winsvc.exe PID 1744 wrote to memory of 1724 1744 winsvc.exe winsvc.exe PID 1744 wrote to memory of 1724 1744 winsvc.exe winsvc.exe PID 1744 wrote to memory of 1724 1744 winsvc.exe winsvc.exe PID 1744 wrote to memory of 1724 1744 winsvc.exe winsvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe"C:\Users\Admin\AppData\Local\Temp\a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe"C:\Users\Admin\AppData\Local\Temp\a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\M-487580275876824076547\winsvc.exeC:\Users\Admin\M-487580275876824076547\winsvc.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\M-487580275876824076547\winsvc.exeC:\Users\Admin\M-487580275876824076547\winsvc.exe4⤵
- Executes dropped EXE
PID:1724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5928452174f5067a712cc36846701686a
SHA1f80242df914a1c5594d46eda37dbffdedfb27aca
SHA256a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58
SHA512dba10ca48fb1c49794cd6fd5c8f403583ec71fbf3a677307a4e4ab256cc4992e5317951cd3c082b86dbd135fbd5ed016af0a0b9bf8be7e7cfeaa3829da88d6fd
-
Filesize
213KB
MD5928452174f5067a712cc36846701686a
SHA1f80242df914a1c5594d46eda37dbffdedfb27aca
SHA256a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58
SHA512dba10ca48fb1c49794cd6fd5c8f403583ec71fbf3a677307a4e4ab256cc4992e5317951cd3c082b86dbd135fbd5ed016af0a0b9bf8be7e7cfeaa3829da88d6fd
-
Filesize
213KB
MD5928452174f5067a712cc36846701686a
SHA1f80242df914a1c5594d46eda37dbffdedfb27aca
SHA256a43b347276b36ddc850374ffab37989f9b6564c0b9c672296107245f8c6c1b58
SHA512dba10ca48fb1c49794cd6fd5c8f403583ec71fbf3a677307a4e4ab256cc4992e5317951cd3c082b86dbd135fbd5ed016af0a0b9bf8be7e7cfeaa3829da88d6fd