Analysis
-
max time kernel
159s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 04:26
Behavioral task
behavioral1
Sample
981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe
Resource
win10v2004-20221111-en
General
-
Target
981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe
-
Size
51KB
-
MD5
55088c4d7b88dafd8d2716b890c010f9
-
SHA1
d1e802b4f4b951c499a3d5f0644c615581893c2d
-
SHA256
981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd
-
SHA512
084b1cac68764c2ec4c104bb801f71ef80d65006a277fd0d6259ef8171c36f68308dec191dac8f3f4eac40557496e0ed2fc73ea5bc5f1c062444255ab8720cf3
-
SSDEEP
768:kkYTL0bL6eLz7vydjFFw0rqEIn5CHV7M5EHdMtSL+/HVXULokCAGGYcuUHm:7qA6ynvyfFwxBn5czHmI+/+LHGGBtHm
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\beep.sys 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MediaCenter\Parameters\ServiceDll = "C:\\Windows\\system32\\RvmstdC.dll" 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe -
resource yara_rule behavioral2/memory/2044-133-0x0000000000400000-0x000000000041A000-memory.dmp upx -
resource yara_rule behavioral2/files/0x0006000000022e63-132.dat vmprotect behavioral2/files/0x0006000000022e63-134.dat vmprotect behavioral2/files/0x0006000000022e63-135.dat vmprotect -
Loads dropped DLL 2 IoCs
pid Process 2044 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe 5068 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RvmstdC.dll 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2044 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe 2044 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe 2044 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe 2044 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2044 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1464 2044 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe 85 PID 2044 wrote to memory of 1464 2044 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe 85 PID 2044 wrote to memory of 1464 2044 981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe"C:\Users\Admin\AppData\Local\Temp\981929d38a638cd8f0f95171b68a27c509435753539751ba2803c2621eb758fd.exe"1⤵
- Drops file in Drivers directory
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\981929~1.EXE > nul2⤵PID:1464
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵PID:4468
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵
- Loads dropped DLL
PID:5068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5aca381740b9a4ef3a0666d8064a0a3c1
SHA130d3b980d2933ce0208f2ee86774290cf48f4d54
SHA256e7b1414428a436a882b516cb9d4e228cc173441935925cbf2207cba83225b3d4
SHA512d9b392e9c0fd454fe5e965a0328e419b8a39fbe76969ac0738da621a15c826f348a37adbe0f4348e5a3413685f27009b6d40645b304e0f05a522c98ac135b69f
-
Filesize
73KB
MD5aca381740b9a4ef3a0666d8064a0a3c1
SHA130d3b980d2933ce0208f2ee86774290cf48f4d54
SHA256e7b1414428a436a882b516cb9d4e228cc173441935925cbf2207cba83225b3d4
SHA512d9b392e9c0fd454fe5e965a0328e419b8a39fbe76969ac0738da621a15c826f348a37adbe0f4348e5a3413685f27009b6d40645b304e0f05a522c98ac135b69f
-
Filesize
73KB
MD5aca381740b9a4ef3a0666d8064a0a3c1
SHA130d3b980d2933ce0208f2ee86774290cf48f4d54
SHA256e7b1414428a436a882b516cb9d4e228cc173441935925cbf2207cba83225b3d4
SHA512d9b392e9c0fd454fe5e965a0328e419b8a39fbe76969ac0738da621a15c826f348a37adbe0f4348e5a3413685f27009b6d40645b304e0f05a522c98ac135b69f