Analysis
-
max time kernel
52s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:54
Behavioral task
behavioral1
Sample
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe
Resource
win7-20220901-en
General
-
Target
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe
-
Size
32KB
-
MD5
fbd5ca774c80b9407b78bd5c6856fd11
-
SHA1
b97d484d2abe716fff0ce88526257ebf6ac629f4
-
SHA256
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a
-
SHA512
4cda55906e7ac93f5fdc9e9d1efe26f1639ea79d17222eb92231b5f4c93fdc8fc9cb9c21af9110667c677176bfa70bcd1e16e56ed6b712fcf143454b8efbb033
-
SSDEEP
768:LIjGFy8mveHt+ozeGlfhJ1GbeP0GIWfqYU:LIGmM+oq0J1GKiWfqYU
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral2/memory/4876-132-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/4876-137-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1664 rundll32.exe -
Drops file in System32 directory 11 IoCs
Processes:
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exedescription ioc process File created C:\Windows\SysWOW64\sysapp43.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\ksuser.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\yumidimap.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\yumsimg32.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\msimg32.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\yuksuser.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\midimap.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 1128 sc.exe 2704 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exepid process 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exepid process 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exenet.exedescription pid process target process PID 4876 wrote to memory of 1152 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe net.exe PID 4876 wrote to memory of 1152 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe net.exe PID 4876 wrote to memory of 1152 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe net.exe PID 4876 wrote to memory of 1128 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 4876 wrote to memory of 1128 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 4876 wrote to memory of 1128 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 4876 wrote to memory of 2704 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 4876 wrote to memory of 2704 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 4876 wrote to memory of 2704 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe sc.exe PID 4876 wrote to memory of 1664 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe rundll32.exe PID 4876 wrote to memory of 1664 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe rundll32.exe PID 4876 wrote to memory of 1664 4876 991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe rundll32.exe PID 1152 wrote to memory of 5084 1152 net.exe net1.exe PID 1152 wrote to memory of 5084 1152 net.exe net1.exe PID 1152 wrote to memory of 5084 1152 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe"C:\Users\Admin\AppData\Local\Temp\991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵PID:5084
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
PID:1128 -
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
PID:2704 -
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1669198237.dat, ServerMain c:\users\admin\appdata\local\temp\991f416e2ef9b45df3eb7c5b6a2d2d6e3b08446e97d2285f9e7073d33a511e9a.exe2⤵
- Loads dropped DLL
PID:1664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5f50f3029c51728748dfe9b5161effe87
SHA18c04381d609fe45c79b6cd9a0131bb58c041e60a
SHA256f355e21c804f923e00547778a1c81d9748f5ab5b29abc29956f5ecf0ca1c0832
SHA512f4a0b80400ece5054a300f4bf473c2a5d79db63030857b59765cbe5cffd109c58dbfe7e91b65eaab370fe3d1cb608172b798cf06131cf3df9355006b38c4b26a
-
Filesize
32KB
MD5f50f3029c51728748dfe9b5161effe87
SHA18c04381d609fe45c79b6cd9a0131bb58c041e60a
SHA256f355e21c804f923e00547778a1c81d9748f5ab5b29abc29956f5ecf0ca1c0832
SHA512f4a0b80400ece5054a300f4bf473c2a5d79db63030857b59765cbe5cffd109c58dbfe7e91b65eaab370fe3d1cb608172b798cf06131cf3df9355006b38c4b26a