Analysis
-
max time kernel
59s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 08:43
Behavioral task
behavioral1
Sample
8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe
Resource
win10v2004-20220812-en
General
-
Target
8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe
-
Size
3.4MB
-
MD5
e854d8ea7fa2e3609eb837d7be2224b3
-
SHA1
dedcd5578202b9955f3b9f55ffa5652372832b39
-
SHA256
8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99
-
SHA512
487377a3a839c803809e9d6716a42592a9110642a27814fad5b371c84e1ca2a176b96dd6fe056ff981e01a0e7e7532e61a3f7663b53f0a3a236f74655429e520
-
SSDEEP
49152:3fvAp68fIudhTdQR1yocZ4Clrx3PXrtRwW/okzrztg0F8vKD:3qDb3ZDdlP4WQgyQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
CompPkgSup.exepid process 668 CompPkgSup.exe -
Processes:
resource yara_rule behavioral1/memory/656-55-0x0000000000A90000-0x0000000000F7A000-memory.dmp vmprotect C:\ProgramData\ComponentUpdater\CompPkgSup.exe vmprotect C:\ProgramData\ComponentUpdater\CompPkgSup.exe vmprotect behavioral1/memory/668-69-0x00000000000A0000-0x000000000058A000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\PackagesSupport = "C:\\ProgramData\\ComponentUpdater\\CompPkgSup.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1948 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1948 taskkill.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.execmd.execmd.execmd.execmd.exetaskeng.exedescription pid process target process PID 656 wrote to memory of 2036 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 2036 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 2036 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 2036 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 2036 wrote to memory of 1948 2036 cmd.exe taskkill.exe PID 2036 wrote to memory of 1948 2036 cmd.exe taskkill.exe PID 2036 wrote to memory of 1948 2036 cmd.exe taskkill.exe PID 2036 wrote to memory of 1948 2036 cmd.exe taskkill.exe PID 656 wrote to memory of 1976 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 1976 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 1976 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 1976 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 1004 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 1004 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 1004 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 1004 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 1976 wrote to memory of 1776 1976 cmd.exe attrib.exe PID 1976 wrote to memory of 1776 1976 cmd.exe attrib.exe PID 1976 wrote to memory of 1776 1976 cmd.exe attrib.exe PID 1976 wrote to memory of 1776 1976 cmd.exe attrib.exe PID 656 wrote to memory of 584 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe schtasks.exe PID 656 wrote to memory of 584 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe schtasks.exe PID 656 wrote to memory of 584 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe schtasks.exe PID 656 wrote to memory of 584 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe schtasks.exe PID 656 wrote to memory of 340 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 340 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 340 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 656 wrote to memory of 340 656 8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe cmd.exe PID 1004 wrote to memory of 820 1004 cmd.exe attrib.exe PID 1004 wrote to memory of 820 1004 cmd.exe attrib.exe PID 1004 wrote to memory of 820 1004 cmd.exe attrib.exe PID 1004 wrote to memory of 820 1004 cmd.exe attrib.exe PID 340 wrote to memory of 1956 340 cmd.exe reg.exe PID 340 wrote to memory of 1956 340 cmd.exe reg.exe PID 340 wrote to memory of 1956 340 cmd.exe reg.exe PID 340 wrote to memory of 1956 340 cmd.exe reg.exe PID 324 wrote to memory of 668 324 taskeng.exe CompPkgSup.exe PID 324 wrote to memory of 668 324 taskeng.exe CompPkgSup.exe PID 324 wrote to memory of 668 324 taskeng.exe CompPkgSup.exe PID 324 wrote to memory of 668 324 taskeng.exe CompPkgSup.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1776 attrib.exe 820 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe"C:\Users\Admin\AppData\Local\Temp\8c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM CompPkgSup.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CompPkgSup.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ATTRIB +h +s C:\ProgramData\ComponentUpdater2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeATTRIB +h +s C:\ProgramData\ComponentUpdater3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ATTRIB +h +s C:\ProgramData\ComponentUpdater\CompPkgSup.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeATTRIB +h +s C:\ProgramData\ComponentUpdater\CompPkgSup.exe3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "PackagesSupport" /tr "C:\ProgramData\ComponentUpdater\CompPkgSup.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "PackagesSupport" /d "C:\ProgramData\ComponentUpdater\CompPkgSup.exe" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "PackagesSupport" /d "C:\ProgramData\ComponentUpdater\CompPkgSup.exe" /f3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\system32\taskeng.exetaskeng.exe {AE413937-900E-4C07-82C1-C91228B24B0C} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\ComponentUpdater\CompPkgSup.exeC:\ProgramData\ComponentUpdater\CompPkgSup.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ComponentUpdater\CompPkgSup.exeFilesize
3.4MB
MD5e854d8ea7fa2e3609eb837d7be2224b3
SHA1dedcd5578202b9955f3b9f55ffa5652372832b39
SHA2568c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99
SHA512487377a3a839c803809e9d6716a42592a9110642a27814fad5b371c84e1ca2a176b96dd6fe056ff981e01a0e7e7532e61a3f7663b53f0a3a236f74655429e520
-
C:\ProgramData\ComponentUpdater\CompPkgSup.exeFilesize
3.4MB
MD5e854d8ea7fa2e3609eb837d7be2224b3
SHA1dedcd5578202b9955f3b9f55ffa5652372832b39
SHA2568c2dcae5ff5261b3f416d6c80dbcf7e571176310cc2104ac9f486551a2dfac99
SHA512487377a3a839c803809e9d6716a42592a9110642a27814fad5b371c84e1ca2a176b96dd6fe056ff981e01a0e7e7532e61a3f7663b53f0a3a236f74655429e520
-
memory/340-62-0x0000000000000000-mapping.dmp
-
memory/584-61-0x0000000000000000-mapping.dmp
-
memory/656-55-0x0000000000A90000-0x0000000000F7A000-memory.dmpFilesize
4.9MB
-
memory/656-54-0x0000000075131000-0x0000000075133000-memory.dmpFilesize
8KB
-
memory/668-69-0x00000000000A0000-0x000000000058A000-memory.dmpFilesize
4.9MB
-
memory/668-66-0x0000000000000000-mapping.dmp
-
memory/820-63-0x0000000000000000-mapping.dmp
-
memory/1004-59-0x0000000000000000-mapping.dmp
-
memory/1776-60-0x0000000000000000-mapping.dmp
-
memory/1948-57-0x0000000000000000-mapping.dmp
-
memory/1956-64-0x0000000000000000-mapping.dmp
-
memory/1976-58-0x0000000000000000-mapping.dmp
-
memory/2036-56-0x0000000000000000-mapping.dmp