Analysis

  • max time kernel
    103s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:44

General

  • Target

    270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe

  • Size

    348KB

  • MD5

    9e4cab69981fa679c9a84375676fcc1d

  • SHA1

    f58cc7f89276024b549330f7b957ff04d0ac1c42

  • SHA256

    270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24

  • SHA512

    380fb1bf9e0d8f47bd166fe36cba92d7052cfe064c5cc390e28cf3f0c1e52dcf3b666246ca6ac06a3a79a30a1706c54e261ae53a4813030b5434929268b84528

  • SSDEEP

    6144:nyWxwCjWwKpb7x+pyO1sYbg0L4J7CpLa6D+qtFukVYG74gdSNDkmmpybIWU:ny5ee7wpyvYby7CpLKqrVYhgYmmoyb

Score
9/10

Malware Config

Signatures

  • Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe
    "C:\Users\Admin\AppData\Local\Temp\270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\924fe5e3.tmp"
      2⤵
      • Deletes itself
      PID:1580
  • C:\Windows\Installer\{FED52A0C-D8E3-277B-330E-F3BF11BEE6D1}\syshost.exe
    "C:\Windows\Installer\{FED52A0C-D8E3-277B-330E-F3BF11BEE6D1}\syshost.exe" /service
    1⤵
    • Drops file in Drivers directory
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Windows\system32\bcdedit.exe
      bcdedit.exe -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:996
    • C:\Windows\system32\bcdedit.exe
      bcdedit.exe -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:520
    • C:\Windows\system32\bcdedit.exe
      bcdedit.exe -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:1112
    • C:\Windows\system32\bcdedit.exe
      bcdedit.exe -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:1364
    • C:\Windows\system32\bcdedit.exe
      bcdedit.exe -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:1912
    • C:\Windows\system32\bcdedit.exe
      bcdedit.exe -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:692
    • C:\Windows\system32\bcdedit.exe
      bcdedit.exe -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:1372
    • C:\Windows\system32\bcdedit.exe
      bcdedit.exe -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:1876
    • C:\Windows\system32\bcdedit.exe
      bcdedit.exe -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:1040
    • C:\Windows\system32\bcdedit.exe
      bcdedit.exe -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:1192
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1756
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1276

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\Installer\{FED52A0C-D8E3-277B-330E-F3BF11BEE6D1}\syshost.exe

        Filesize

        348KB

        MD5

        9e4cab69981fa679c9a84375676fcc1d

        SHA1

        f58cc7f89276024b549330f7b957ff04d0ac1c42

        SHA256

        270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24

        SHA512

        380fb1bf9e0d8f47bd166fe36cba92d7052cfe064c5cc390e28cf3f0c1e52dcf3b666246ca6ac06a3a79a30a1706c54e261ae53a4813030b5434929268b84528

      • memory/520-64-0x0000000000000000-mapping.dmp

      • memory/692-68-0x0000000000000000-mapping.dmp

      • memory/968-76-0x00000000002B0000-0x00000000002B6000-memory.dmp

        Filesize

        24KB

      • memory/968-75-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/968-60-0x0000000000A60000-0x0000000000ABA000-memory.dmp

        Filesize

        360KB

      • memory/968-61-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/968-62-0x00000000002B0000-0x00000000002B6000-memory.dmp

        Filesize

        24KB

      • memory/996-63-0x0000000000000000-mapping.dmp

      • memory/1040-71-0x0000000000000000-mapping.dmp

      • memory/1112-65-0x0000000000000000-mapping.dmp

      • memory/1192-72-0x0000000000000000-mapping.dmp

      • memory/1364-66-0x0000000000000000-mapping.dmp

      • memory/1372-69-0x0000000000000000-mapping.dmp

      • memory/1580-73-0x0000000000000000-mapping.dmp

      • memory/1748-54-0x0000000076191000-0x0000000076193000-memory.dmp

        Filesize

        8KB

      • memory/1748-57-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/1748-74-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/1748-56-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/1748-55-0x00000000004D0000-0x000000000052A000-memory.dmp

        Filesize

        360KB

      • memory/1756-77-0x000007FEFC171000-0x000007FEFC173000-memory.dmp

        Filesize

        8KB

      • memory/1876-70-0x0000000000000000-mapping.dmp

      • memory/1912-67-0x0000000000000000-mapping.dmp