Analysis
-
max time kernel
151s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:08
Behavioral task
behavioral1
Sample
7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe
Resource
win10v2004-20220901-en
General
-
Target
7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe
-
Size
368KB
-
MD5
891d6585190bc5d5a219562c998ae945
-
SHA1
571981a09506df4c110a90041648f606d201776c
-
SHA256
7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
-
SHA512
a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
SSDEEP
6144:hYDhB6ActM8FbPt6a15RGkPNJAcb+k2WzoPiML3AYRYAe5mYkl5q+cvrfA:K9BvctM85t35JPNJj2WzoRLQYRYzmYOd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
Processes:
svchost.comsvchost.comdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\SysWOW64\\userinit.exe,C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\SysWOW64\\userinit.exe,C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\fdisk.com" svchost.com -
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
Processes:
svchost.comsvchost.comdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "2" svchost.com Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "2" svchost.com -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
svchost.comsvchost.comdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.com Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.com -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Disables RegEdit via registry modification 2 IoCs
Processes:
svchost.comsvchost.comdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.com Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.com -
Disables Task Manager via registry modification
-
Executes dropped EXE 4 IoCs
Processes:
svchost.comcftmon.exesvchost.comcftmon.exepid process 4144 svchost.com 932 cftmon.exe 1732 svchost.com 5004 cftmon.exe -
Sets file execution options in registry 2 TTPs 48 IoCs
Processes:
svchost.comsvchost.comdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\resmon.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\resmon.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\resmon.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\resmon.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com -
Processes:
resource yara_rule behavioral2/memory/5080-132-0x0000000000400000-0x00000000004C8000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\svchost.com upx C:\Users\Admin\AppData\Local\Temp\svchost.com upx behavioral2/memory/5080-136-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/4144-137-0x0000000000400000-0x00000000004C8000-memory.dmp upx C:\Program Files (x86)\Common Files\System\cftmon.exe upx C:\Program Files (x86)\Common Files\System\cftmon.exe upx behavioral2/memory/932-142-0x0000000000400000-0x00000000004C8000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\svchost.com upx \??\c:\Thumbs.db upx C:\Users\Admin\Templates\cache\SFCsrvc.pif upx C:\Windows\SysWOW64\fdisk.com upx C:\Windows\Help\cliconf.chm upx C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sndvol32.exe upx C:\Program Files (x86)\Common Files\System\cftmon.exe upx behavioral2/memory/932-151-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1732-152-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/5004-153-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1732-164-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/4144-165-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/5004-166-0x0000000000400000-0x00000000004C8000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
svchost.comcftmon.exe7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cftmon.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe -
Drops startup file 2 IoCs
Processes:
svchost.comdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sndvol32.exe svchost.com File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sndvol32.exe svchost.com -
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
svchost.comsvchost.comdescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.com -
Drops desktop.ini file(s) 4 IoCs
Processes:
7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exesvchost.comdescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini 7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe File opened for modification C:\Users\Admin\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini svchost.com File opened for modification C:\Users\Admin\Templates\cache\desktop.ini svchost.com File opened for modification \??\c:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini svchost.com -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.comsvchost.comdescription ioc process File opened (read-only) \??\t: svchost.com File opened (read-only) \??\i: svchost.com File opened (read-only) \??\b: svchost.com File opened (read-only) \??\j: svchost.com File opened (read-only) \??\z: svchost.com File opened (read-only) \??\t: svchost.com File opened (read-only) \??\i: svchost.com File opened (read-only) \??\m: svchost.com File opened (read-only) \??\o: svchost.com File opened (read-only) \??\h: svchost.com File opened (read-only) \??\l: svchost.com File opened (read-only) \??\p: svchost.com File opened (read-only) \??\s: svchost.com File opened (read-only) \??\h: svchost.com File opened (read-only) \??\v: svchost.com File opened (read-only) \??\y: svchost.com File opened (read-only) \??\u: svchost.com File opened (read-only) \??\l: svchost.com File opened (read-only) \??\s: svchost.com File opened (read-only) \??\u: svchost.com File opened (read-only) \??\x: svchost.com File opened (read-only) \??\k: svchost.com File opened (read-only) \??\m: svchost.com File opened (read-only) \??\n: svchost.com File opened (read-only) \??\j: svchost.com File opened (read-only) \??\q: svchost.com File opened (read-only) \??\v: svchost.com File opened (read-only) \??\w: svchost.com File opened (read-only) \??\y: svchost.com File opened (read-only) \??\z: svchost.com File opened (read-only) \??\f: svchost.com File opened (read-only) \??\w: svchost.com File opened (read-only) \??\a: svchost.com File opened (read-only) \??\q: svchost.com File opened (read-only) \??\r: svchost.com File opened (read-only) \??\e: svchost.com File opened (read-only) \??\e: svchost.com File opened (read-only) \??\n: svchost.com File opened (read-only) \??\p: svchost.com File opened (read-only) \??\a: svchost.com File opened (read-only) \??\g: svchost.com File opened (read-only) \??\f: svchost.com File opened (read-only) \??\g: svchost.com File opened (read-only) \??\k: svchost.com File opened (read-only) \??\o: svchost.com File opened (read-only) \??\r: svchost.com File opened (read-only) \??\x: svchost.com File opened (read-only) \??\b: svchost.com -
Modifies WinLogon 2 TTPs 5 IoCs
Processes:
svchost.comdescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList svchost.com Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\Network_Service = "0" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\KeepRasConnections = "1" svchost.com -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/5080-132-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe behavioral2/memory/5080-136-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe behavioral2/memory/4144-137-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe behavioral2/memory/932-142-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe behavioral2/memory/932-151-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe behavioral2/memory/1732-152-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe behavioral2/memory/5004-153-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe behavioral2/memory/1732-164-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe behavioral2/memory/4144-165-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe behavioral2/memory/5004-166-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
svchost.comdescription ioc process File opened for modification \??\c:\autorun.inf svchost.com File opened for modification C:\\autorun.inf svchost.com -
Drops file in System32 directory 2 IoCs
Processes:
svchost.comdescription ioc process File created C:\Windows\SysWOW64\fdisk.com svchost.com File opened for modification C:\Windows\SysWOW64\fdisk.com svchost.com -
Drops file in Program Files directory 1 IoCs
Processes:
svchost.comdescription ioc process File created C:\Program Files (x86)\Common Files\System\cftmon.exe svchost.com -
Drops file in Windows directory 1 IoCs
Processes:
svchost.comdescription ioc process File created C:\Windows\Help\cliconf.chm svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 15 IoCs
Processes:
svchost.comdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications\xnotepad.exe\shell\open\command\ = "C:\\Program Files (x86)\\Common Files\\System\\cftmon.exe %1" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LibraryFolder\shellex\SharingHandler svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications\xnotepad.exe svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications\xnotepad.exe\shell\open svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications\xmspaint.exe\shell\open\command svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications\xmspaint.exe\shell\open svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications\xnotepad.exe\shell\open\command svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications\xmspaint.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Network\SharingHandler svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Network\SharingHandler\ svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LibraryFolder\ShellEx\SharingHandler\ svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications\xnotepad.exe\shell svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications\xmspaint.exe\shell svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Applications\xmspaint.exe\shell\open\command\ = "C:\\Program Files (x86)\\Common Files\\System\\cftmon.exe %1" svchost.com -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exesvchost.comsvchost.comcftmon.exepid process 5080 7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe 5080 7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 4144 svchost.com 1732 svchost.com 1732 svchost.com 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe 5004 cftmon.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exesvchost.comcftmon.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 5080 wrote to memory of 4144 5080 7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe svchost.com PID 5080 wrote to memory of 4144 5080 7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe svchost.com PID 5080 wrote to memory of 4144 5080 7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe svchost.com PID 4144 wrote to memory of 932 4144 svchost.com cftmon.exe PID 4144 wrote to memory of 932 4144 svchost.com cftmon.exe PID 4144 wrote to memory of 932 4144 svchost.com cftmon.exe PID 4144 wrote to memory of 1732 4144 svchost.com svchost.com PID 4144 wrote to memory of 1732 4144 svchost.com svchost.com PID 4144 wrote to memory of 1732 4144 svchost.com svchost.com PID 932 wrote to memory of 5004 932 cftmon.exe cftmon.exe PID 932 wrote to memory of 5004 932 cftmon.exe cftmon.exe PID 932 wrote to memory of 5004 932 cftmon.exe cftmon.exe PID 4144 wrote to memory of 4828 4144 svchost.com net.exe PID 4144 wrote to memory of 4828 4144 svchost.com net.exe PID 4144 wrote to memory of 4828 4144 svchost.com net.exe PID 4144 wrote to memory of 4164 4144 svchost.com net.exe PID 4144 wrote to memory of 4164 4144 svchost.com net.exe PID 4144 wrote to memory of 4164 4144 svchost.com net.exe PID 4828 wrote to memory of 4684 4828 net.exe net1.exe PID 4828 wrote to memory of 4684 4828 net.exe net1.exe PID 4828 wrote to memory of 4684 4828 net.exe net1.exe PID 4164 wrote to memory of 3568 4164 net.exe net1.exe PID 4164 wrote to memory of 3568 4164 net.exe net1.exe PID 4164 wrote to memory of 3568 4164 net.exe net1.exe PID 4144 wrote to memory of 1456 4144 svchost.com net.exe PID 4144 wrote to memory of 1456 4144 svchost.com net.exe PID 4144 wrote to memory of 1456 4144 svchost.com net.exe PID 1456 wrote to memory of 4548 1456 net.exe net1.exe PID 1456 wrote to memory of 4548 1456 net.exe net1.exe PID 1456 wrote to memory of 4548 1456 net.exe net1.exe PID 4144 wrote to memory of 2424 4144 svchost.com net.exe PID 4144 wrote to memory of 2424 4144 svchost.com net.exe PID 4144 wrote to memory of 2424 4144 svchost.com net.exe PID 2424 wrote to memory of 4608 2424 net.exe net1.exe PID 2424 wrote to memory of 4608 2424 net.exe net1.exe PID 2424 wrote to memory of 4608 2424 net.exe net1.exe PID 4144 wrote to memory of 1344 4144 svchost.com net.exe PID 4144 wrote to memory of 1344 4144 svchost.com net.exe PID 4144 wrote to memory of 1344 4144 svchost.com net.exe PID 1344 wrote to memory of 4308 1344 net.exe net1.exe PID 1344 wrote to memory of 4308 1344 net.exe net1.exe PID 1344 wrote to memory of 4308 1344 net.exe net1.exe -
System policy modification 1 TTPs 6 IoCs
Processes:
svchost.comdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svchost.com Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoAdminPage = "1" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Network svchost.com Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Network\NoFileSharingControl = "1" svchost.com Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Network\NoFileSharing = "0" svchost.com Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Network\NoPrintSharing = "0" svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe"C:\Users\Admin\AppData\Local\Temp\7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\svchost.com"C:\Users\Admin\AppData\Local\Temp\svchost.com"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4144 -
C:\Program Files (x86)\Common Files\System\cftmon.exe"C:\Program Files (x86)\Common Files\System\cftmon.exe" stay_alive -in3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files (x86)\Common Files\System\cftmon.exe"C:\Program Files (x86)\Common Files\System\cftmon.exe" stay_alive -r4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\svchost.comC:\Users\Admin\AppData\Local\Temp\svchost.com keep_fucking3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" share SYS_c=c:\3⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share SYS_c=c:\4⤵PID:4684
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" user guest guest3⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user guest guest4⤵PID:3568
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" user /add Network_Service3⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user /add Network_Service4⤵PID:4548
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" user Network_Service 10167603⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Network_Service 10167604⤵PID:4608
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" localgroup administrators Network_Service /add3⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators Network_Service /add4⤵PID:4308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7
-
Filesize
368KB
MD5891d6585190bc5d5a219562c998ae945
SHA1571981a09506df4c110a90041648f606d201776c
SHA2567fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78
SHA512a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7