Analysis
-
max time kernel
202s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:58
Static task
static1
Behavioral task
behavioral1
Sample
0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe
Resource
win10v2004-20221111-en
General
-
Target
0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe
-
Size
87KB
-
MD5
e7fceebd11f69a00d6ec2856e2fe1835
-
SHA1
f8016b412cdb8c6d6f3bb74e85b59ed0ff203db8
-
SHA256
0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d
-
SHA512
8b77150607142abe5bdc40f4e578a624adfcf8ec4c02df8fe9d9e1083095c0a259d6eb586ac98c52c4a69f87982df0f9b452378a87f983d128e43cf72dc49a64
-
SSDEEP
1536:OWoWmsjGwdQe2ZBslGwery5fGpb1clN5Vjd3TLU5fgXRgglg2Rvw:wWmsuZBssw6LcLdf8fgBgglg2Rw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
syshost.exepid process 1564 syshost.exe -
Modifies Windows Firewall 1 TTPs 4 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exepid process 1200 netsh.exe 4588 netsh.exe 3828 netsh.exe 1304 netsh.exe -
Drops file in Windows directory 3 IoCs
Processes:
0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exesyshost.exedescription ioc process File created C:\Windows\Installer\{BF904683-2D9F-E588-C5CB-9600A33078B3}\syshost.exe 0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe File opened for modification C:\Windows\Installer\{BF904683-2D9F-E588-C5CB-9600A33078B3}\syshost.exe 0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe File opened for modification C:\Windows\Installer\{BF904683-2D9F-E588-C5CB-9600A33078B3}\syshost.exe.tmp syshost.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
syshost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\Windows Error Reporting syshost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
syshost.exepid process 1564 syshost.exe 1564 syshost.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exepid process 4328 0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
syshost.exedescription pid process Token: SeAssignPrimaryTokenPrivilege 1564 syshost.exe Token: SeIncreaseQuotaPrivilege 1564 syshost.exe Token: SeShutdownPrivilege 1564 syshost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exesyshost.exedescription pid process target process PID 4328 wrote to memory of 4196 4328 0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe cmd.exe PID 4328 wrote to memory of 4196 4328 0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe cmd.exe PID 4328 wrote to memory of 4196 4328 0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe cmd.exe PID 1564 wrote to memory of 3828 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 3828 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 3828 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 1304 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 1304 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 1304 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 1200 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 1200 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 1200 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 4588 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 4588 1564 syshost.exe netsh.exe PID 1564 wrote to memory of 4588 1564 syshost.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe"C:\Users\Admin\AppData\Local\Temp\0b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\dede79fd.tmp"2⤵PID:4196
-
C:\Windows\Installer\{BF904683-2D9F-E588-C5CB-9600A33078B3}\syshost.exe"C:\Windows\Installer\{BF904683-2D9F-E588-C5CB-9600A33078B3}\syshost.exe" /service1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall set rule name="Core Networking - System IP Core" dir=in new action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
PID:3828 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Core Networking - System IP Core" dir=in action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
PID:1304 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall set rule name="Core Networking - System IP Core" dir=out new action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
PID:1200 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Core Networking - System IP Core" dir=out action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
PID:4588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5e7fceebd11f69a00d6ec2856e2fe1835
SHA1f8016b412cdb8c6d6f3bb74e85b59ed0ff203db8
SHA2560b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d
SHA5128b77150607142abe5bdc40f4e578a624adfcf8ec4c02df8fe9d9e1083095c0a259d6eb586ac98c52c4a69f87982df0f9b452378a87f983d128e43cf72dc49a64
-
Filesize
87KB
MD5e7fceebd11f69a00d6ec2856e2fe1835
SHA1f8016b412cdb8c6d6f3bb74e85b59ed0ff203db8
SHA2560b592f8fa27773427e81fcce883e8a57737973e34567122113ac72c5d616e44d
SHA5128b77150607142abe5bdc40f4e578a624adfcf8ec4c02df8fe9d9e1083095c0a259d6eb586ac98c52c4a69f87982df0f9b452378a87f983d128e43cf72dc49a64