Analysis
-
max time kernel
241s -
max time network
237s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:57
Static task
static1
Behavioral task
behavioral1
Sample
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe
Resource
win10v2004-20220812-en
General
-
Target
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe
-
Size
415KB
-
MD5
71b0279ff6b5f1dddac59a0704070e28
-
SHA1
ff50f7d7e1d09298ff5a37351a682f83c5df8c87
-
SHA256
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00
-
SHA512
4aafab5f4a0460bbb718ad15cc6dbd6fd82e812e2e3bf552d2193f1e6864c88f4c07de75c5cb9c6a1786e72664985fa9f2cc9b90c941846d62dfdce2700b2f89
-
SSDEEP
12288:5rcDe1mZuOe0gYxyC84TcWEDsBwER1cvQpq:lcDe1mZuV0gYxJ80FEDdE/cE
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 icanhazip.com -
Drops file in Program Files directory 1 IoCs
Processes:
windriver.exedescription ioc process File opened for modification C:\Program Files (x86)\Hardware Driver Management\id.txt windriver.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3720 taskkill.exe 2188 taskkill.exe 1184 taskkill.exe 2492 taskkill.exe 3584 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
windriver.exepid process 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe 4780 windriver.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exepid process 4272 fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2492 taskkill.exe Token: SeDebugPrivilege 3584 taskkill.exe Token: SeDebugPrivilege 3720 taskkill.exe Token: SeDebugPrivilege 2188 taskkill.exe Token: SeDebugPrivilege 1184 taskkill.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.execmd.exewindriver.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4272 wrote to memory of 1804 4272 fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe cmd.exe PID 4272 wrote to memory of 1804 4272 fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe cmd.exe PID 4272 wrote to memory of 1804 4272 fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe cmd.exe PID 1804 wrote to memory of 2492 1804 cmd.exe taskkill.exe PID 1804 wrote to memory of 2492 1804 cmd.exe taskkill.exe PID 1804 wrote to memory of 2492 1804 cmd.exe taskkill.exe PID 4780 wrote to memory of 1964 4780 windriver.exe cmd.exe PID 4780 wrote to memory of 1964 4780 windriver.exe cmd.exe PID 4780 wrote to memory of 1964 4780 windriver.exe cmd.exe PID 1964 wrote to memory of 3584 1964 cmd.exe taskkill.exe PID 1964 wrote to memory of 3584 1964 cmd.exe taskkill.exe PID 1964 wrote to memory of 3584 1964 cmd.exe taskkill.exe PID 4780 wrote to memory of 4408 4780 windriver.exe cmd.exe PID 4780 wrote to memory of 4408 4780 windriver.exe cmd.exe PID 4780 wrote to memory of 4408 4780 windriver.exe cmd.exe PID 4780 wrote to memory of 952 4780 windriver.exe cmd.exe PID 4780 wrote to memory of 952 4780 windriver.exe cmd.exe PID 4780 wrote to memory of 952 4780 windriver.exe cmd.exe PID 4780 wrote to memory of 3096 4780 windriver.exe cmd.exe PID 4780 wrote to memory of 3096 4780 windriver.exe cmd.exe PID 4780 wrote to memory of 3096 4780 windriver.exe cmd.exe PID 4408 wrote to memory of 3720 4408 cmd.exe taskkill.exe PID 4408 wrote to memory of 3720 4408 cmd.exe taskkill.exe PID 4408 wrote to memory of 3720 4408 cmd.exe taskkill.exe PID 3096 wrote to memory of 2188 3096 cmd.exe taskkill.exe PID 3096 wrote to memory of 2188 3096 cmd.exe taskkill.exe PID 3096 wrote to memory of 2188 3096 cmd.exe taskkill.exe PID 952 wrote to memory of 1184 952 cmd.exe taskkill.exe PID 952 wrote to memory of 1184 952 cmd.exe taskkill.exe PID 952 wrote to memory of 1184 952 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe"C:\Users\Admin\AppData\Local\Temp\fab31a2d44e38e733e1002286e5df164509afe18149a8a2f527ec6dc5e71cb00.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im LMS.dat2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im LMS.dat3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
C:\Program Files (x86)\Hardware Driver Management\windriver.exe"C:\Program Files (x86)\Hardware Driver Management\windriver.exe" --server1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im LMS.dat2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im LMS.dat3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im LMS.dat2⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im LMS.dat3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im LMS.dat2⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im LMS.dat3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im LMS.dat2⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im LMS.dat3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1184