Analysis

  • max time kernel
    141s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:27

General

  • Target

    f50cf14ee372911f23a37ec6fd1b3057679fc3dd28b750c4c4f9f9d889001d8f.exe

  • Size

    322KB

  • MD5

    75580b956deb96405be09b3b12c1236b

  • SHA1

    95b4c11e76af988f599e86048e68352e45e27344

  • SHA256

    f50cf14ee372911f23a37ec6fd1b3057679fc3dd28b750c4c4f9f9d889001d8f

  • SHA512

    5fdda83c74e8922ff0c6520cf3cf5550878f31f85e718d696fa7fde150bd212bf5d270142dd94ae8dee1f7a5af7f6444360d03bbd48f0d4525d05f37a8675ca5

  • SSDEEP

    6144:kncod+WTL+lgRPgjaOi1aY8VK2ZPIzAw+9ScTi:XS+WTL+lgRS3i0VK29IcJ9ti

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
    1⤵
      PID:752
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
      1⤵
        PID:800
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k NetworkService
        1⤵
          PID:300
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
          1⤵
            PID:964
          • C:\Windows\Explorer.EXE
            C:\Windows\Explorer.EXE
            1⤵
              PID:1212
              • C:\Users\Admin\AppData\Local\Temp\f50cf14ee372911f23a37ec6fd1b3057679fc3dd28b750c4c4f9f9d889001d8f.exe
                "C:\Users\Admin\AppData\Local\Temp\f50cf14ee372911f23a37ec6fd1b3057679fc3dd28b750c4c4f9f9d889001d8f.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:852
                • C:\Users\Admin\AppData\Local\Temp\f50cf14ee372911f23a37ec6fd1b3057679fc3dd28b750c4c4f9f9d889001d8f.exe
                  "C:\Users\Admin\AppData\Local\Temp\f50cf14ee372911f23a37ec6fd1b3057679fc3dd28b750c4c4f9f9d889001d8f.exe"
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1220
                  • C:\Users\Admin\AppData\Local\Temp\f50cf14ee372911f23a37ec6fd1b3057679fc3dd28b750c4c4f9f9d889001d8f.exe
                    "C:\Users\Admin\AppData\Local\Temp\f50cf14ee372911f23a37ec6fd1b3057679fc3dd28b750c4c4f9f9d889001d8f.exe" /runmain
                    4⤵
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:284
                    • C:\Users\Admin\AppData\Local\Temp\f50cf14ee372911f23a37ec6fd1b3057679fc3dd28b750c4c4f9f9d889001d8f.exe
                      "C:\Users\Admin\AppData\Local\Temp\f50cf14ee372911f23a37ec6fd1b3057679fc3dd28b750c4c4f9f9d889001d8f.exe" /runmain
                      5⤵
                      • Drops file in Drivers directory
                      PID:904
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\F50CF1~1.EXE >> NUL
                    4⤵
                      PID:1528
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                1⤵
                  PID:1076
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs
                  1⤵
                    PID:876
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService
                    1⤵
                      PID:844
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k RPCSS
                      1⤵
                        PID:668
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k DcomLaunch
                        1⤵
                          PID:584

                        Network

                        MITRE ATT&CK Matrix

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • memory/284-89-0x0000000000000000-mapping.dmp

                        • memory/584-68-0x0000000000360000-0x0000000000383000-memory.dmp

                          Filesize

                          140KB

                        • memory/852-65-0x0000000001C80000-0x0000000001CA0000-memory.dmp

                          Filesize

                          128KB

                        • memory/904-107-0x0000000000400000-0x0000000000424565-memory.dmp

                          Filesize

                          145KB

                        • memory/904-106-0x00000000002A0000-0x00000000002B1000-memory.dmp

                          Filesize

                          68KB

                        • memory/904-105-0x0000000000270000-0x0000000000293000-memory.dmp

                          Filesize

                          140KB

                        • memory/904-102-0x0000000000401ADF-mapping.dmp

                        • memory/1220-67-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

                          Filesize

                          8KB

                        • memory/1220-64-0x0000000000401ADF-mapping.dmp

                        • memory/1220-63-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/1220-54-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/1220-61-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/1220-73-0x0000000000400000-0x0000000000424565-memory.dmp

                          Filesize

                          145KB

                        • memory/1220-60-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/1220-91-0x0000000000400000-0x0000000000424565-memory.dmp

                          Filesize

                          145KB

                        • memory/1220-59-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/1220-58-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/1220-57-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/1220-55-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/1528-90-0x0000000000000000-mapping.dmp