Analysis
-
max time kernel
243s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:52
Behavioral task
behavioral1
Sample
154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe
Resource
win10v2004-20221111-en
General
-
Target
154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe
-
Size
308KB
-
MD5
4f0c4f7a2be67072665ac5f48c756da0
-
SHA1
5ed66fa081c0a07cc079b1548e91556a6b60b832
-
SHA256
154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b
-
SHA512
5c627141d716cff548f3b8fbb09b2edea7d23b0b04a3f9759e9e371aa85dd6f8082309b677c9bd1b119c5ad1011889cf72fa648b8077c5f596fa4b6c390d3a9e
-
SSDEEP
6144:YyAWbOUfseiFDyHqpzgxuHN6q9OM3ESNt84ULuFMtBZBmE6UTQVwoSu:KAO19oq1QI4y3H/8xxBZBmE6UTQuoSu
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Windows Updater.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Updater.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Update\\winupdt.exe:*:Enabled:Windows Messanger" reg.exe -
Executes dropped EXE 2 IoCs
Processes:
winupdt.exewinupdt.exepid process 1768 winupdt.exe 1792 winupdt.exe -
Processes:
yara_rule upx behavioral1/memory/968-54-0x0000000000400000-0x0000000000591000-memory.dmp upx \Users\Admin\AppData\Roaming\Windows Update\winupdt.exe upx \Users\Admin\AppData\Roaming\Windows Update\winupdt.exe upx \Users\Admin\AppData\Roaming\Windows Update\winupdt.exe upx \Users\Admin\AppData\Roaming\Windows Update\winupdt.exe upx \Users\Admin\AppData\Roaming\Windows Update\winupdt.exe upx C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe upx behavioral1/memory/968-68-0x0000000000400000-0x0000000000591000-memory.dmp upx C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe upx behavioral1/memory/1792-72-0x0000000000400000-0x000000000045C000-memory.dmp upx C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe upx behavioral1/memory/1792-76-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1768-77-0x0000000000400000-0x0000000000591000-memory.dmp upx behavioral1/memory/1792-78-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1792-81-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1792-92-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Loads dropped DLL 5 IoCs
Processes:
154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exepid process 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Window Updates = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Update\\winupdt.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
winupdt.exedescription pid process target process PID 1768 set thread context of 1792 1768 winupdt.exe winupdt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 432 reg.exe 1820 reg.exe 684 reg.exe 280 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
winupdt.exedescription pid process Token: 1 1792 winupdt.exe Token: SeCreateTokenPrivilege 1792 winupdt.exe Token: SeAssignPrimaryTokenPrivilege 1792 winupdt.exe Token: SeLockMemoryPrivilege 1792 winupdt.exe Token: SeIncreaseQuotaPrivilege 1792 winupdt.exe Token: SeMachineAccountPrivilege 1792 winupdt.exe Token: SeTcbPrivilege 1792 winupdt.exe Token: SeSecurityPrivilege 1792 winupdt.exe Token: SeTakeOwnershipPrivilege 1792 winupdt.exe Token: SeLoadDriverPrivilege 1792 winupdt.exe Token: SeSystemProfilePrivilege 1792 winupdt.exe Token: SeSystemtimePrivilege 1792 winupdt.exe Token: SeProfSingleProcessPrivilege 1792 winupdt.exe Token: SeIncBasePriorityPrivilege 1792 winupdt.exe Token: SeCreatePagefilePrivilege 1792 winupdt.exe Token: SeCreatePermanentPrivilege 1792 winupdt.exe Token: SeBackupPrivilege 1792 winupdt.exe Token: SeRestorePrivilege 1792 winupdt.exe Token: SeShutdownPrivilege 1792 winupdt.exe Token: SeDebugPrivilege 1792 winupdt.exe Token: SeAuditPrivilege 1792 winupdt.exe Token: SeSystemEnvironmentPrivilege 1792 winupdt.exe Token: SeChangeNotifyPrivilege 1792 winupdt.exe Token: SeRemoteShutdownPrivilege 1792 winupdt.exe Token: SeUndockPrivilege 1792 winupdt.exe Token: SeSyncAgentPrivilege 1792 winupdt.exe Token: SeEnableDelegationPrivilege 1792 winupdt.exe Token: SeManageVolumePrivilege 1792 winupdt.exe Token: SeImpersonatePrivilege 1792 winupdt.exe Token: SeCreateGlobalPrivilege 1792 winupdt.exe Token: 31 1792 winupdt.exe Token: 32 1792 winupdt.exe Token: 33 1792 winupdt.exe Token: 34 1792 winupdt.exe Token: 35 1792 winupdt.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exewinupdt.exewinupdt.exepid process 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe 1768 winupdt.exe 1792 winupdt.exe 1792 winupdt.exe 1792 winupdt.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.execmd.exewinupdt.exewinupdt.execmd.execmd.execmd.execmd.exedescription pid process target process PID 968 wrote to memory of 680 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe cmd.exe PID 968 wrote to memory of 680 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe cmd.exe PID 968 wrote to memory of 680 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe cmd.exe PID 968 wrote to memory of 680 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe cmd.exe PID 680 wrote to memory of 276 680 cmd.exe reg.exe PID 680 wrote to memory of 276 680 cmd.exe reg.exe PID 680 wrote to memory of 276 680 cmd.exe reg.exe PID 680 wrote to memory of 276 680 cmd.exe reg.exe PID 968 wrote to memory of 1768 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe winupdt.exe PID 968 wrote to memory of 1768 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe winupdt.exe PID 968 wrote to memory of 1768 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe winupdt.exe PID 968 wrote to memory of 1768 968 154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe winupdt.exe PID 1768 wrote to memory of 1792 1768 winupdt.exe winupdt.exe PID 1768 wrote to memory of 1792 1768 winupdt.exe winupdt.exe PID 1768 wrote to memory of 1792 1768 winupdt.exe winupdt.exe PID 1768 wrote to memory of 1792 1768 winupdt.exe winupdt.exe PID 1768 wrote to memory of 1792 1768 winupdt.exe winupdt.exe PID 1768 wrote to memory of 1792 1768 winupdt.exe winupdt.exe PID 1768 wrote to memory of 1792 1768 winupdt.exe winupdt.exe PID 1768 wrote to memory of 1792 1768 winupdt.exe winupdt.exe PID 1768 wrote to memory of 1792 1768 winupdt.exe winupdt.exe PID 1792 wrote to memory of 1804 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1804 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1804 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1804 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1968 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1968 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1968 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1968 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1472 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1472 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1472 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 1472 1792 winupdt.exe cmd.exe PID 1804 wrote to memory of 432 1804 cmd.exe reg.exe PID 1804 wrote to memory of 432 1804 cmd.exe reg.exe PID 1804 wrote to memory of 432 1804 cmd.exe reg.exe PID 1804 wrote to memory of 432 1804 cmd.exe reg.exe PID 1792 wrote to memory of 844 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 844 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 844 1792 winupdt.exe cmd.exe PID 1792 wrote to memory of 844 1792 winupdt.exe cmd.exe PID 1472 wrote to memory of 1820 1472 cmd.exe reg.exe PID 1472 wrote to memory of 1820 1472 cmd.exe reg.exe PID 1472 wrote to memory of 1820 1472 cmd.exe reg.exe PID 1472 wrote to memory of 1820 1472 cmd.exe reg.exe PID 1968 wrote to memory of 684 1968 cmd.exe reg.exe PID 1968 wrote to memory of 684 1968 cmd.exe reg.exe PID 1968 wrote to memory of 684 1968 cmd.exe reg.exe PID 1968 wrote to memory of 684 1968 cmd.exe reg.exe PID 844 wrote to memory of 280 844 cmd.exe reg.exe PID 844 wrote to memory of 280 844 cmd.exe reg.exe PID 844 wrote to memory of 280 844 cmd.exe reg.exe PID 844 wrote to memory of 280 844 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe"C:\Users\Admin\AppData\Local\Temp\154dec649855d624285779d75aac3fcdae916fc91f99a402dcebe9485041066b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FzuYk.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Window Updates" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe" /f3⤵
- Adds Run key to start application
PID:276 -
C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe"C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe"C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:432 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1820 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:684 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD51954c7e666c5b4d1117ef07bc0c9b8ec
SHA1559e3c0273c1463e9184027b749bdaad0a372681
SHA25635e0dbc8b455ca38976157ce9d0293fd6cdca20f46f1cb69058a1e0f0af6f693
SHA5123939de8d0ab7e67b59ff8bebed5580dafd38d8785193fd42a289728500761a68b9e6660605e19e10d4278dd106fea4b273a208f25485e7389c8f19b2958c926a
-
Filesize
308KB
MD5aeda6473b0a426b9ae26470eba559f28
SHA1f4bb63dbe46607860843c0c939833c98e35d0162
SHA2564fa1596ebf89d1004fe01961181d9b43f38ba3f4d6d405f99fd0596800b5d3a9
SHA512eb994873532dfc3c303af0cdf91d2232cbbc2a15488fa2e046706026a8d78c54262cfe1b86519a4c32d230731bc91997610d921276f121ce02c4a30b48fe5d2d
-
Filesize
308KB
MD5aeda6473b0a426b9ae26470eba559f28
SHA1f4bb63dbe46607860843c0c939833c98e35d0162
SHA2564fa1596ebf89d1004fe01961181d9b43f38ba3f4d6d405f99fd0596800b5d3a9
SHA512eb994873532dfc3c303af0cdf91d2232cbbc2a15488fa2e046706026a8d78c54262cfe1b86519a4c32d230731bc91997610d921276f121ce02c4a30b48fe5d2d
-
Filesize
308KB
MD5aeda6473b0a426b9ae26470eba559f28
SHA1f4bb63dbe46607860843c0c939833c98e35d0162
SHA2564fa1596ebf89d1004fe01961181d9b43f38ba3f4d6d405f99fd0596800b5d3a9
SHA512eb994873532dfc3c303af0cdf91d2232cbbc2a15488fa2e046706026a8d78c54262cfe1b86519a4c32d230731bc91997610d921276f121ce02c4a30b48fe5d2d
-
Filesize
308KB
MD5aeda6473b0a426b9ae26470eba559f28
SHA1f4bb63dbe46607860843c0c939833c98e35d0162
SHA2564fa1596ebf89d1004fe01961181d9b43f38ba3f4d6d405f99fd0596800b5d3a9
SHA512eb994873532dfc3c303af0cdf91d2232cbbc2a15488fa2e046706026a8d78c54262cfe1b86519a4c32d230731bc91997610d921276f121ce02c4a30b48fe5d2d
-
Filesize
308KB
MD5aeda6473b0a426b9ae26470eba559f28
SHA1f4bb63dbe46607860843c0c939833c98e35d0162
SHA2564fa1596ebf89d1004fe01961181d9b43f38ba3f4d6d405f99fd0596800b5d3a9
SHA512eb994873532dfc3c303af0cdf91d2232cbbc2a15488fa2e046706026a8d78c54262cfe1b86519a4c32d230731bc91997610d921276f121ce02c4a30b48fe5d2d
-
Filesize
308KB
MD5aeda6473b0a426b9ae26470eba559f28
SHA1f4bb63dbe46607860843c0c939833c98e35d0162
SHA2564fa1596ebf89d1004fe01961181d9b43f38ba3f4d6d405f99fd0596800b5d3a9
SHA512eb994873532dfc3c303af0cdf91d2232cbbc2a15488fa2e046706026a8d78c54262cfe1b86519a4c32d230731bc91997610d921276f121ce02c4a30b48fe5d2d
-
Filesize
308KB
MD5aeda6473b0a426b9ae26470eba559f28
SHA1f4bb63dbe46607860843c0c939833c98e35d0162
SHA2564fa1596ebf89d1004fe01961181d9b43f38ba3f4d6d405f99fd0596800b5d3a9
SHA512eb994873532dfc3c303af0cdf91d2232cbbc2a15488fa2e046706026a8d78c54262cfe1b86519a4c32d230731bc91997610d921276f121ce02c4a30b48fe5d2d
-
Filesize
308KB
MD5aeda6473b0a426b9ae26470eba559f28
SHA1f4bb63dbe46607860843c0c939833c98e35d0162
SHA2564fa1596ebf89d1004fe01961181d9b43f38ba3f4d6d405f99fd0596800b5d3a9
SHA512eb994873532dfc3c303af0cdf91d2232cbbc2a15488fa2e046706026a8d78c54262cfe1b86519a4c32d230731bc91997610d921276f121ce02c4a30b48fe5d2d