Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:54
Behavioral task
behavioral1
Sample
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe
Resource
win7-20220901-en
General
-
Target
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe
-
Size
32KB
-
MD5
fbd5ca774c80b9407b78bd5c6856fd11
-
SHA1
b97d484d2abe716fff0ce88526257ebf6ac629f4
-
SHA256
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a
-
SHA512
4cda55906e7ac93f5fdc9e9d1efe26f1639ea79d17222eb92231b5f4c93fdc8fc9cb9c21af9110667c677176bfa70bcd1e16e56ed6b712fcf143454b8efbb033
-
SSDEEP
768:LIjGFy8mveHt+ozeGlfhJ1GbeP0GIWfqYU:LIGmM+oq0J1GKiWfqYU
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral1/memory/2016-58-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
rundll32.exepid process 320 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 320 rundll32.exe -
Drops file in System32 directory 11 IoCs
Processes:
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exedescription ioc process File created C:\Windows\SysWOW64\dllcache\ksuser.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\yumidimap.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\yumsimg32.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\msimg32.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\yuksuser.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\ksuser.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\midimap.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\sysapp43.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 1896 sc.exe 1880 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exepid process 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exepid process 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exenet.exedescription pid process target process PID 2016 wrote to memory of 1080 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe net.exe PID 2016 wrote to memory of 1080 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe net.exe PID 2016 wrote to memory of 1080 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe net.exe PID 2016 wrote to memory of 1080 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe net.exe PID 2016 wrote to memory of 1896 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 2016 wrote to memory of 1896 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 2016 wrote to memory of 1896 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 2016 wrote to memory of 1896 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 2016 wrote to memory of 1880 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 2016 wrote to memory of 1880 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 2016 wrote to memory of 1880 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 2016 wrote to memory of 1880 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 2016 wrote to memory of 320 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe rundll32.exe PID 2016 wrote to memory of 320 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe rundll32.exe PID 2016 wrote to memory of 320 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe rundll32.exe PID 2016 wrote to memory of 320 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe rundll32.exe PID 2016 wrote to memory of 320 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe rundll32.exe PID 2016 wrote to memory of 320 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe rundll32.exe PID 2016 wrote to memory of 320 2016 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe rundll32.exe PID 1080 wrote to memory of 1692 1080 net.exe net1.exe PID 1080 wrote to memory of 1692 1080 net.exe net1.exe PID 1080 wrote to memory of 1692 1080 net.exe net1.exe PID 1080 wrote to memory of 1692 1080 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe"C:\Users\Admin\AppData\Local\Temp\991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵PID:1692
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
PID:1896 -
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
PID:1880 -
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1669198234.dat, ServerMain c:\users\admin\appdata\local\temp\991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe2⤵
- Deletes itself
- Loads dropped DLL
PID:320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD554d1bbf2b652d706d19b2484da38ec5d
SHA1dd1c3be12a7e8a7418c22a1b13f86268d3acb4f8
SHA2565d541146cc5eeeaf89bd22e9e0c273d0ff7fb5c2f512bca6c30030d6eadb3fa5
SHA512e1a89060f53706d2b4f06ab46a35a49cfd3bac351145b4630dfc7fd9d71637f5e27c76b2de87c30b05372c99c531d5df6f3727686e0a7f6a0883c8268f0ab779
-
Filesize
32KB
MD554d1bbf2b652d706d19b2484da38ec5d
SHA1dd1c3be12a7e8a7418c22a1b13f86268d3acb4f8
SHA2565d541146cc5eeeaf89bd22e9e0c273d0ff7fb5c2f512bca6c30030d6eadb3fa5
SHA512e1a89060f53706d2b4f06ab46a35a49cfd3bac351145b4630dfc7fd9d71637f5e27c76b2de87c30b05372c99c531d5df6f3727686e0a7f6a0883c8268f0ab779