Analysis
-
max time kernel
16s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 12:30
Static task
static1
Behavioral task
behavioral1
Sample
f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe
-
Size
216KB
-
MD5
88f9c81bf69cde243fa55d8b77b07dd2
-
SHA1
eee450f5fec2242d0d1057bd8e4d1f7ab2f11a6a
-
SHA256
f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812
-
SHA512
eeb6461292438f6d2ed90713d282c1535bb7c13ff2d085861b34dd0e3d45fdc8e07f0676b3f52bd76eea8392027ee88412cf649735084a7115c6ae6156e426dc
-
SSDEEP
6144:L63B7PRp/6XP90OzsKP58jeLq4oYXskCTMC1j:WR7pU/mqBPOMzStJ
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 1076 bcdedit.exe 1124 bcdedit.exe 1712 bcdedit.exe 836 bcdedit.exe 2028 bcdedit.exe 1700 bcdedit.exe 1708 bcdedit.exe 1180 bcdedit.exe 1588 bcdedit.exe 608 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
syshost.exedescription ioc process File created C:\Windows\system32\drivers\6c1269.sys syshost.exe -
Executes dropped EXE 1 IoCs
Processes:
syshost.exepid process 916 syshost.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1464 cmd.exe -
Drops file in Windows directory 3 IoCs
Processes:
f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exesyshost.exedescription ioc process File created C:\Windows\Installer\{41296F46-7A29-BA3F-6404-8C0C3CB711C6}\syshost.exe f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe File opened for modification C:\Windows\Installer\{41296F46-7A29-BA3F-6404-8C0C3CB711C6}\syshost.exe f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe File opened for modification C:\Windows\Installer\{41296F46-7A29-BA3F-6404-8C0C3CB711C6}\syshost.exe.tmp syshost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exepid process 1108 f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
syshost.exedescription pid process Token: SeShutdownPrivilege 916 syshost.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exesyshost.exedescription pid process target process PID 1108 wrote to memory of 1464 1108 f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe cmd.exe PID 1108 wrote to memory of 1464 1108 f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe cmd.exe PID 1108 wrote to memory of 1464 1108 f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe cmd.exe PID 1108 wrote to memory of 1464 1108 f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe cmd.exe PID 916 wrote to memory of 1076 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1076 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1076 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1076 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1124 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1124 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1124 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1124 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1712 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1712 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1712 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1712 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 836 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 836 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 836 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 836 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 2028 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 2028 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 2028 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 2028 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1700 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1700 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1700 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1700 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1708 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1708 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1708 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1708 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1180 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1180 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1180 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1180 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1588 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1588 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1588 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 1588 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 608 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 608 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 608 916 syshost.exe bcdedit.exe PID 916 wrote to memory of 608 916 syshost.exe bcdedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe"C:\Users\Admin\AppData\Local\Temp\f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\826dbc47.tmp"2⤵
- Deletes itself
PID:1464
-
C:\Windows\Installer\{41296F46-7A29-BA3F-6404-8C0C3CB711C6}\syshost.exe"C:\Windows\Installer\{41296F46-7A29-BA3F-6404-8C0C3CB711C6}\syshost.exe" /service1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1076 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1124 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1712 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:836 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:2028 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1700 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1708 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1180 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:1588 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
PID:608
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1044
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD588f9c81bf69cde243fa55d8b77b07dd2
SHA1eee450f5fec2242d0d1057bd8e4d1f7ab2f11a6a
SHA256f7dc6cfcc93ad200a615e4b0b1951e7ab159636eb48d8f19874dc1698e532812
SHA512eeb6461292438f6d2ed90713d282c1535bb7c13ff2d085861b34dd0e3d45fdc8e07f0676b3f52bd76eea8392027ee88412cf649735084a7115c6ae6156e426dc