Analysis
-
max time kernel
132s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 22:36
Static task
static1
Behavioral task
behavioral1
Sample
77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe
Resource
win10v2004-20221111-en
General
-
Target
77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe
-
Size
76KB
-
MD5
c80f556153f4798901692cce450bbb60
-
SHA1
ceffdae200685c6cc6e9f0a71748346e157e86b0
-
SHA256
77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c
-
SHA512
1e4e7a88e5fe217e3c5e80415d11203a192db43814feee4b2d53b107d9047dd37ec491195776ea400ecb92723c464c4d02cac2430c8ea552b5697cd08bc50c4c
-
SSDEEP
768:nu17djCLTWQ+LMmdjjQ4hsMg8jfVjIbdu+KdoJzc5XvHFcoIPwHCO1XSBcb9KEsh:nuzCveYzsFZmboCq5ahO+c5KEsh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1784 svchost.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 596 cmd.exe 596 cmd.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
regini.exeregini.exesvchost.exeregini.exeregini.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run regini.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run regini.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\x86kernel2 = "c:\\users\\admin\\appdata\\roaming\\73339737\\svchost.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run regini.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run regini.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\x86kernel2 = "c:\\users\\admin\\appdata\\roaming\\73339737\\svchost.exe" svchost.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1112 sc.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.execmd.execmd.execmd.exesvchost.exenet.exedescription pid process target process PID 1632 wrote to memory of 1320 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1632 wrote to memory of 1320 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1632 wrote to memory of 1320 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1632 wrote to memory of 1320 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1320 wrote to memory of 952 1320 cmd.exe cmd.exe PID 1320 wrote to memory of 952 1320 cmd.exe cmd.exe PID 1320 wrote to memory of 952 1320 cmd.exe cmd.exe PID 1320 wrote to memory of 952 1320 cmd.exe cmd.exe PID 1320 wrote to memory of 1220 1320 cmd.exe cacls.exe PID 1320 wrote to memory of 1220 1320 cmd.exe cacls.exe PID 1320 wrote to memory of 1220 1320 cmd.exe cacls.exe PID 1320 wrote to memory of 1220 1320 cmd.exe cacls.exe PID 1632 wrote to memory of 1828 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1632 wrote to memory of 1828 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1632 wrote to memory of 1828 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1632 wrote to memory of 1828 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1828 wrote to memory of 1836 1828 cmd.exe cmd.exe PID 1828 wrote to memory of 1836 1828 cmd.exe cmd.exe PID 1828 wrote to memory of 1836 1828 cmd.exe cmd.exe PID 1828 wrote to memory of 1836 1828 cmd.exe cmd.exe PID 1828 wrote to memory of 288 1828 cmd.exe cacls.exe PID 1828 wrote to memory of 288 1828 cmd.exe cacls.exe PID 1828 wrote to memory of 288 1828 cmd.exe cacls.exe PID 1828 wrote to memory of 288 1828 cmd.exe cacls.exe PID 1632 wrote to memory of 596 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1632 wrote to memory of 596 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1632 wrote to memory of 596 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 1632 wrote to memory of 596 1632 77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe cmd.exe PID 596 wrote to memory of 1784 596 cmd.exe svchost.exe PID 596 wrote to memory of 1784 596 cmd.exe svchost.exe PID 596 wrote to memory of 1784 596 cmd.exe svchost.exe PID 596 wrote to memory of 1784 596 cmd.exe svchost.exe PID 1784 wrote to memory of 616 1784 svchost.exe regini.exe PID 1784 wrote to memory of 616 1784 svchost.exe regini.exe PID 1784 wrote to memory of 616 1784 svchost.exe regini.exe PID 1784 wrote to memory of 616 1784 svchost.exe regini.exe PID 1784 wrote to memory of 520 1784 svchost.exe net.exe PID 1784 wrote to memory of 520 1784 svchost.exe net.exe PID 1784 wrote to memory of 520 1784 svchost.exe net.exe PID 1784 wrote to memory of 520 1784 svchost.exe net.exe PID 1784 wrote to memory of 1112 1784 svchost.exe sc.exe PID 1784 wrote to memory of 1112 1784 svchost.exe sc.exe PID 1784 wrote to memory of 1112 1784 svchost.exe sc.exe PID 1784 wrote to memory of 1112 1784 svchost.exe sc.exe PID 1784 wrote to memory of 760 1784 svchost.exe regini.exe PID 1784 wrote to memory of 760 1784 svchost.exe regini.exe PID 1784 wrote to memory of 760 1784 svchost.exe regini.exe PID 1784 wrote to memory of 760 1784 svchost.exe regini.exe PID 1784 wrote to memory of 1772 1784 svchost.exe regini.exe PID 1784 wrote to memory of 1772 1784 svchost.exe regini.exe PID 1784 wrote to memory of 1772 1784 svchost.exe regini.exe PID 1784 wrote to memory of 1772 1784 svchost.exe regini.exe PID 1784 wrote to memory of 2008 1784 svchost.exe regini.exe PID 1784 wrote to memory of 2008 1784 svchost.exe regini.exe PID 1784 wrote to memory of 2008 1784 svchost.exe regini.exe PID 1784 wrote to memory of 2008 1784 svchost.exe regini.exe PID 520 wrote to memory of 436 520 net.exe net1.exe PID 520 wrote to memory of 436 520 net.exe net1.exe PID 520 wrote to memory of 436 520 net.exe net1.exe PID 520 wrote to memory of 436 520 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe"C:\Users\Admin\AppData\Local\Temp\77998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|CACLS "c:\users\admin\appdata\roaming\73339737\svchost.exe" /P "Admin:R"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "c:\users\admin\appdata\roaming\73339737\svchost.exe" /P "Admin:R"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|CACLS "c:\users\admin\appdata\roaming\73339737" /P "Admin:R"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "c:\users\admin\appdata\roaming\73339737" /P "Admin:R"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\73339737\svchost.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\73339737\svchost.exeC:\Users\Admin\AppData\Roaming\73339737\svchost.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵
-
C:\Windows\SysWOW64\regini.exeregini per4⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\regini.exeregini perper4⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\regini.exeregini perperper4⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\regini.exeregini perperperper4⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\perFilesize
68B
MD577612e763aacc6671e0c81713b419a41
SHA199c986a0e3bc15532bbca5a18ff90de93fefe7fc
SHA25608f53032b63ada0a816ab77088624bef24a5451b7c7e0de05f958e5bd4e6977b
SHA51299f94d1016eb7bff8deed9eb68c6d26756b2b02a30c4aa5dcc111429e0117acfbc15d7f4119fe06abead5039ee241afc1e6756d2e2250a08fcc818a50598b6cf
-
C:\Users\Admin\AppData\Local\Temp\perperFilesize
68B
MD5a6585d9cf9d692905da3ed6c1b9dd4c1
SHA1166b3aece6d5a7d172acd0a1327af9265a5bf5d4
SHA25650a38aee5de374bab740c163c3debc500041a2ee3aad01d466347eecf2540015
SHA512a402fcebe80023edc9322adeecc89b8df845a80061008c26b890e33636869817460b57a326ee65dcd2bd7275933f9407be96aba7bfeae17530b55985ad00c65c
-
C:\Users\Admin\AppData\Local\Temp\perperperFilesize
67B
MD5e4bcd320585af9f77671cc6e91fe9de6
SHA115f12439eb3e133affb37b29e41e57d89fc90e06
SHA256a1e0f5a9cfc9615222f04e65455c7c4c1ba86710275afffd472428a293c31ec8
SHA51200497885531c0b84fe869828e5f2c0631f2f175f961c62175736487ae703252ba7393f882ffe99d8c4bcdb951172e35daa9ca41f45e64ce97fbae7721b25c112
-
C:\Users\Admin\AppData\Local\Temp\perperperperFilesize
67B
MD558b2f90cc0182925ae0bab51700b14ab
SHA1d2975adeb8dc68f2f5e10edee524de78e79828db
SHA2568114822fe9a58e5ba08abb480dd595109c66a49d9afc404f85843915694c2964
SHA512de6154d3d44c7e332f5cf1f3b1e4f20612ecd37f08fa60382ecc5008af2d9a55216357d6927e706fd2ef60b772e7941631fdfe9b1d615e5264e99cffe59ad782
-
C:\Users\Admin\AppData\Roaming\73339737\svchost.exeFilesize
76KB
MD5c80f556153f4798901692cce450bbb60
SHA1ceffdae200685c6cc6e9f0a71748346e157e86b0
SHA25677998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c
SHA5121e4e7a88e5fe217e3c5e80415d11203a192db43814feee4b2d53b107d9047dd37ec491195776ea400ecb92723c464c4d02cac2430c8ea552b5697cd08bc50c4c
-
\??\c:\users\admin\appdata\roaming\73339737\svchost.exeFilesize
76KB
MD5c80f556153f4798901692cce450bbb60
SHA1ceffdae200685c6cc6e9f0a71748346e157e86b0
SHA25677998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c
SHA5121e4e7a88e5fe217e3c5e80415d11203a192db43814feee4b2d53b107d9047dd37ec491195776ea400ecb92723c464c4d02cac2430c8ea552b5697cd08bc50c4c
-
\Users\Admin\AppData\Roaming\73339737\svchost.exeFilesize
76KB
MD5c80f556153f4798901692cce450bbb60
SHA1ceffdae200685c6cc6e9f0a71748346e157e86b0
SHA25677998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c
SHA5121e4e7a88e5fe217e3c5e80415d11203a192db43814feee4b2d53b107d9047dd37ec491195776ea400ecb92723c464c4d02cac2430c8ea552b5697cd08bc50c4c
-
\Users\Admin\AppData\Roaming\73339737\svchost.exeFilesize
76KB
MD5c80f556153f4798901692cce450bbb60
SHA1ceffdae200685c6cc6e9f0a71748346e157e86b0
SHA25677998d6e1369d8666340525d9fb941b93fe5cfb6c02a045d78f736ae57aac56c
SHA5121e4e7a88e5fe217e3c5e80415d11203a192db43814feee4b2d53b107d9047dd37ec491195776ea400ecb92723c464c4d02cac2430c8ea552b5697cd08bc50c4c
-
memory/288-61-0x0000000000000000-mapping.dmp
-
memory/436-78-0x0000000000000000-mapping.dmp
-
memory/520-69-0x0000000000000000-mapping.dmp
-
memory/596-62-0x0000000000000000-mapping.dmp
-
memory/616-68-0x0000000000000000-mapping.dmp
-
memory/760-72-0x0000000000000000-mapping.dmp
-
memory/952-56-0x0000000000000000-mapping.dmp
-
memory/1112-70-0x0000000000000000-mapping.dmp
-
memory/1220-57-0x0000000000000000-mapping.dmp
-
memory/1320-55-0x0000000000000000-mapping.dmp
-
memory/1632-54-0x0000000075071000-0x0000000075073000-memory.dmpFilesize
8KB
-
memory/1772-74-0x0000000000000000-mapping.dmp
-
memory/1784-65-0x0000000000000000-mapping.dmp
-
memory/1828-59-0x0000000000000000-mapping.dmp
-
memory/1836-60-0x0000000000000000-mapping.dmp
-
memory/2008-76-0x0000000000000000-mapping.dmp