Analysis
-
max time kernel
103s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:44
Static task
static1
Behavioral task
behavioral1
Sample
270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe
Resource
win10v2004-20220812-en
General
-
Target
270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe
-
Size
348KB
-
MD5
9e4cab69981fa679c9a84375676fcc1d
-
SHA1
f58cc7f89276024b549330f7b957ff04d0ac1c42
-
SHA256
270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24
-
SHA512
380fb1bf9e0d8f47bd166fe36cba92d7052cfe064c5cc390e28cf3f0c1e52dcf3b666246ca6ac06a3a79a30a1706c54e261ae53a4813030b5434929268b84528
-
SSDEEP
6144:nyWxwCjWwKpb7x+pyO1sYbg0L4J7CpLa6D+qtFukVYG74gdSNDkmmpybIWU:ny5ee7wpyvYby7CpLKqrVYhgYmmoyb
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 996 bcdedit.exe 520 bcdedit.exe 1112 bcdedit.exe 1364 bcdedit.exe 1912 bcdedit.exe 692 bcdedit.exe 1372 bcdedit.exe 1876 bcdedit.exe 1040 bcdedit.exe 1192 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
syshost.exedescription ioc process File created C:\Windows\system32\drivers\6c7fac.sys syshost.exe -
Executes dropped EXE 1 IoCs
Processes:
syshost.exepid process 968 syshost.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1580 cmd.exe -
Drops file in Windows directory 3 IoCs
Processes:
270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exesyshost.exedescription ioc process File created C:\Windows\Installer\{FED52A0C-D8E3-277B-330E-F3BF11BEE6D1}\syshost.exe 270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe File opened for modification C:\Windows\Installer\{FED52A0C-D8E3-277B-330E-F3BF11BEE6D1}\syshost.exe 270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe File opened for modification C:\Windows\Installer\{FED52A0C-D8E3-277B-330E-F3BF11BEE6D1}\syshost.exe.tmp syshost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exepid process 1748 270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
syshost.exedescription pid process Token: SeShutdownPrivilege 968 syshost.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
syshost.exe270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exedescription pid process target process PID 968 wrote to memory of 996 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 996 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 996 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 996 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 520 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 520 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 520 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 520 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1112 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1112 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1112 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1112 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1364 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1364 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1364 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1364 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1912 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1912 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1912 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1912 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 692 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 692 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 692 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 692 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1372 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1372 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1372 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1372 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1876 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1876 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1876 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1876 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1040 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1040 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1040 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1040 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1192 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1192 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1192 968 syshost.exe bcdedit.exe PID 968 wrote to memory of 1192 968 syshost.exe bcdedit.exe PID 1748 wrote to memory of 1580 1748 270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe cmd.exe PID 1748 wrote to memory of 1580 1748 270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe cmd.exe PID 1748 wrote to memory of 1580 1748 270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe cmd.exe PID 1748 wrote to memory of 1580 1748 270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe"C:\Users\Admin\AppData\Local\Temp\270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\924fe5e3.tmp"2⤵
- Deletes itself
PID:1580
-
C:\Windows\Installer\{FED52A0C-D8E3-277B-330E-F3BF11BEE6D1}\syshost.exe"C:\Windows\Installer\{FED52A0C-D8E3-277B-330E-F3BF11BEE6D1}\syshost.exe" /service1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:996 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:520 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1112 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1364 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1912 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:692 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1372 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1876 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1040 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1192
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1756
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD59e4cab69981fa679c9a84375676fcc1d
SHA1f58cc7f89276024b549330f7b957ff04d0ac1c42
SHA256270d5d46ea16e02b8bd73e23904653304d4bd41c79aaccf42cf0cce1efa8fb24
SHA512380fb1bf9e0d8f47bd166fe36cba92d7052cfe064c5cc390e28cf3f0c1e52dcf3b666246ca6ac06a3a79a30a1706c54e261ae53a4813030b5434929268b84528