Analysis
-
max time kernel
27s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:58
Behavioral task
behavioral1
Sample
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe
Resource
win10v2004-20220901-en
General
-
Target
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe
-
Size
46KB
-
MD5
5354d80d4a823b570c8c6478cc9b8147
-
SHA1
ce1fbb6a725d3201c48224241c03f26d1ff98a84
-
SHA256
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc
-
SHA512
e380f218dcd26c70268d6acf020f371301bdf1f257c6e5c589715af197f3eab005e3fdd083dee3e2be3549d82d1b234ed41d048bcdaff343b7b8aa2262a4be18
-
SSDEEP
768:pBRQek1xOQKW9xsimoZ1VGjg4xz+3a87UHloVdd+SUyr2wwI/DJrNFq:pTQpc3SsPoZ1eFSaMlt+ZMJJs
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe -
Disables use of System Restore points 1 TTPs
-
Processes:
resource yara_rule behavioral1/memory/904-55-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/904-56-0x0000000000400000-0x000000000043F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lvbdhfnga/AA//MX0Mlk4yAKX = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe" c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Lvbdhfnga/AA//MX0Mlk4yAKX = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe" c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe -
Processes:
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exepid process 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
Processes:
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exepid process 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exedescription pid process Token: SeDebugPrivilege 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exedescription pid process target process PID 904 wrote to memory of 368 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe wininit.exe PID 904 wrote to memory of 368 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe wininit.exe PID 904 wrote to memory of 368 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe wininit.exe PID 904 wrote to memory of 368 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe wininit.exe PID 904 wrote to memory of 368 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe wininit.exe PID 904 wrote to memory of 368 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe wininit.exe PID 904 wrote to memory of 368 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe wininit.exe PID 904 wrote to memory of 380 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe csrss.exe PID 904 wrote to memory of 380 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe csrss.exe PID 904 wrote to memory of 380 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe csrss.exe PID 904 wrote to memory of 380 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe csrss.exe PID 904 wrote to memory of 380 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe csrss.exe PID 904 wrote to memory of 380 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe csrss.exe PID 904 wrote to memory of 380 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe csrss.exe PID 904 wrote to memory of 416 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe winlogon.exe PID 904 wrote to memory of 416 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe winlogon.exe PID 904 wrote to memory of 416 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe winlogon.exe PID 904 wrote to memory of 416 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe winlogon.exe PID 904 wrote to memory of 416 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe winlogon.exe PID 904 wrote to memory of 416 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe winlogon.exe PID 904 wrote to memory of 416 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe winlogon.exe PID 904 wrote to memory of 460 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe services.exe PID 904 wrote to memory of 460 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe services.exe PID 904 wrote to memory of 460 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe services.exe PID 904 wrote to memory of 460 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe services.exe PID 904 wrote to memory of 460 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe services.exe PID 904 wrote to memory of 460 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe services.exe PID 904 wrote to memory of 460 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe services.exe PID 904 wrote to memory of 476 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsass.exe PID 904 wrote to memory of 476 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsass.exe PID 904 wrote to memory of 476 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsass.exe PID 904 wrote to memory of 476 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsass.exe PID 904 wrote to memory of 476 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsass.exe PID 904 wrote to memory of 476 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsass.exe PID 904 wrote to memory of 476 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsass.exe PID 904 wrote to memory of 484 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsm.exe PID 904 wrote to memory of 484 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsm.exe PID 904 wrote to memory of 484 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsm.exe PID 904 wrote to memory of 484 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsm.exe PID 904 wrote to memory of 484 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsm.exe PID 904 wrote to memory of 484 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsm.exe PID 904 wrote to memory of 484 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe lsm.exe PID 904 wrote to memory of 596 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 596 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 596 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 596 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 596 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 596 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 596 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 680 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 680 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 680 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 680 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 680 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 680 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 680 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 752 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 752 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 752 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 752 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 752 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 752 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 752 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe PID 904 wrote to memory of 820 904 c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:292
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1760
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1816
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1152
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1092
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1036
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:884
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:856
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:820
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:752
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:680
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:596
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:2008
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe"C:\Users\Admin\AppData\Local\Temp\c913c6b385e462a633721d38ec1fbe065656fbfedfcdfc7999120534d6b03dfc.exe"2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180