Analysis
-
max time kernel
169s -
max time network
245s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 07:57
Static task
static1
Behavioral task
behavioral1
Sample
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe
Resource
win10v2004-20220812-en
General
-
Target
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe
-
Size
415KB
-
MD5
71b0279ff6b5f1dddac59a0704070e28
-
SHA1
ff50f7d7e1d09298ff5a37351a682f83c5df8c87
-
SHA256
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00
-
SHA512
4aafab5f4a0460bbb718ad15cc6dbd6fd82e812e2e3bf552d2193f1e6864c88f4c07de75c5cb9c6a1786e72664985fa9f2cc9b90c941846d62dfdce2700b2f89
-
SSDEEP
12288:5rcDe1mZuOe0gYxyC84TcWEDsBwER1cvQpq:lcDe1mZuV0gYxJ80FEDdE/cE
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 icanhazip.com -
Drops file in Program Files directory 1 IoCs
Processes:
windriver.exedescription ioc process File opened for modification C:\Program Files (x86)\Hardware Driver Management\id.txt windriver.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1300 taskkill.exe 800 taskkill.exe 1176 taskkill.exe 1936 taskkill.exe 1616 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
windriver.exepid process 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe 684 windriver.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exepid process 1672 fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1616 taskkill.exe Token: SeDebugPrivilege 1300 taskkill.exe Token: SeDebugPrivilege 800 taskkill.exe Token: SeDebugPrivilege 1936 taskkill.exe Token: SeDebugPrivilege 1176 taskkill.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.execmd.exewindriver.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1672 wrote to memory of 1656 1672 fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe cmd.exe PID 1672 wrote to memory of 1656 1672 fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe cmd.exe PID 1672 wrote to memory of 1656 1672 fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe cmd.exe PID 1672 wrote to memory of 1656 1672 fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe cmd.exe PID 1656 wrote to memory of 1616 1656 cmd.exe taskkill.exe PID 1656 wrote to memory of 1616 1656 cmd.exe taskkill.exe PID 1656 wrote to memory of 1616 1656 cmd.exe taskkill.exe PID 1656 wrote to memory of 1616 1656 cmd.exe taskkill.exe PID 684 wrote to memory of 940 684 windriver.exe cmd.exe PID 684 wrote to memory of 940 684 windriver.exe cmd.exe PID 684 wrote to memory of 940 684 windriver.exe cmd.exe PID 684 wrote to memory of 940 684 windriver.exe cmd.exe PID 940 wrote to memory of 1300 940 cmd.exe taskkill.exe PID 940 wrote to memory of 1300 940 cmd.exe taskkill.exe PID 940 wrote to memory of 1300 940 cmd.exe taskkill.exe PID 940 wrote to memory of 1300 940 cmd.exe taskkill.exe PID 684 wrote to memory of 1844 684 windriver.exe cmd.exe PID 684 wrote to memory of 1844 684 windriver.exe cmd.exe PID 684 wrote to memory of 1844 684 windriver.exe cmd.exe PID 684 wrote to memory of 1844 684 windriver.exe cmd.exe PID 684 wrote to memory of 1464 684 windriver.exe cmd.exe PID 684 wrote to memory of 1464 684 windriver.exe cmd.exe PID 684 wrote to memory of 1464 684 windriver.exe cmd.exe PID 684 wrote to memory of 1464 684 windriver.exe cmd.exe PID 684 wrote to memory of 1756 684 windriver.exe cmd.exe PID 684 wrote to memory of 1756 684 windriver.exe cmd.exe PID 684 wrote to memory of 1756 684 windriver.exe cmd.exe PID 684 wrote to memory of 1756 684 windriver.exe cmd.exe PID 1464 wrote to memory of 800 1464 cmd.exe taskkill.exe PID 1464 wrote to memory of 800 1464 cmd.exe taskkill.exe PID 1464 wrote to memory of 800 1464 cmd.exe taskkill.exe PID 1464 wrote to memory of 800 1464 cmd.exe taskkill.exe PID 1756 wrote to memory of 1936 1756 cmd.exe taskkill.exe PID 1756 wrote to memory of 1936 1756 cmd.exe taskkill.exe PID 1756 wrote to memory of 1936 1756 cmd.exe taskkill.exe PID 1756 wrote to memory of 1936 1756 cmd.exe taskkill.exe PID 1844 wrote to memory of 1176 1844 cmd.exe taskkill.exe PID 1844 wrote to memory of 1176 1844 cmd.exe taskkill.exe PID 1844 wrote to memory of 1176 1844 cmd.exe taskkill.exe PID 1844 wrote to memory of 1176 1844 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe"C:\Users\Admin\AppData\Local\Temp\fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im LMS.dat2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im LMS.dat3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
C:\Program Files (x86)\Hardware Driver Management\windriver.exe"C:\Program Files (x86)\Hardware Driver Management\windriver.exe" --server1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im LMS.dat2⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im LMS.dat3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im LMS.dat2⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im LMS.dat3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im LMS.dat2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im LMS.dat2⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im LMS.dat3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im LMS.dat1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:800