Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 06:44
Static task
static1
Behavioral task
behavioral1
Sample
05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe
-
Size
354KB
-
MD5
c7f0b60cb67b263d2d83cf3d7b7689d1
-
SHA1
0b90ef666968e5de30d93c8608107879a118b840
-
SHA256
05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841
-
SHA512
742aaecdd7c0f60dc91094fe3b62c0650760828735aaeaee765af5d074af9ec24f704ffa2e0f2b84be057030c5cef25874f80beb5dbae25f7d1f4a208ea6647c
-
SSDEEP
6144:ZHYKnUf8h+jyl10FqQ55vAy1NxkyOPf2V4/QdzZA6zva1gX+aohzpI:LUfi+j410FP55xxkNf2V1hZoq+R
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 1820 bcdedit.exe 1780 bcdedit.exe 1360 bcdedit.exe 1484 bcdedit.exe 824 bcdedit.exe 968 bcdedit.exe 604 bcdedit.exe 1372 bcdedit.exe 1036 bcdedit.exe 1920 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
syshost.exedescription ioc process File created C:\Windows\system32\drivers\6c2434.sys syshost.exe -
Executes dropped EXE 2 IoCs
Processes:
syshost.exesyshost.exepid process 1720 syshost.exe 1716 syshost.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 576 cmd.exe -
Loads dropped DLL 5 IoCs
Processes:
WerFault.exe05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exepid process 1540 WerFault.exe 1540 WerFault.exe 1540 WerFault.exe 1540 WerFault.exe 1672 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\syshost32 = "C:\\Windows\\Installer\\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\\syshost.exe" 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe -
Drops file in Windows directory 3 IoCs
Processes:
05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exesyshost.exedescription ioc process File opened for modification C:\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exe 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe File opened for modification C:\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exe.tmp syshost.exe File created C:\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exe 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1540 1720 WerFault.exe syshost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exepid process 1672 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
syshost.exedescription pid process Token: SeShutdownPrivilege 1716 syshost.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
syshost.exe05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exesyshost.exedescription pid process target process PID 1720 wrote to memory of 1540 1720 syshost.exe WerFault.exe PID 1720 wrote to memory of 1540 1720 syshost.exe WerFault.exe PID 1720 wrote to memory of 1540 1720 syshost.exe WerFault.exe PID 1720 wrote to memory of 1540 1720 syshost.exe WerFault.exe PID 1672 wrote to memory of 1716 1672 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe syshost.exe PID 1672 wrote to memory of 1716 1672 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe syshost.exe PID 1672 wrote to memory of 1716 1672 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe syshost.exe PID 1672 wrote to memory of 1716 1672 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe syshost.exe PID 1672 wrote to memory of 576 1672 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe cmd.exe PID 1672 wrote to memory of 576 1672 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe cmd.exe PID 1672 wrote to memory of 576 1672 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe cmd.exe PID 1672 wrote to memory of 576 1672 05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe cmd.exe PID 1716 wrote to memory of 1820 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1820 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1820 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1820 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1780 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1780 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1780 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1780 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1484 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1484 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1484 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1484 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1360 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1360 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1360 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1360 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 968 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 968 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 968 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 968 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 824 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 824 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 824 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 824 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 604 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 604 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 604 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 604 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1920 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1920 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1920 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1920 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1036 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1036 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1036 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1036 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1372 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1372 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1372 1716 syshost.exe bcdedit.exe PID 1716 wrote to memory of 1372 1716 syshost.exe bcdedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe"C:\Users\Admin\AppData\Local\Temp\05306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exeC:\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\314d7556.tmp"2⤵
- Deletes itself
-
C:\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exe"C:\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exe" /service1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 1322⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exeFilesize
354KB
MD5c7f0b60cb67b263d2d83cf3d7b7689d1
SHA10b90ef666968e5de30d93c8608107879a118b840
SHA25605306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841
SHA512742aaecdd7c0f60dc91094fe3b62c0650760828735aaeaee765af5d074af9ec24f704ffa2e0f2b84be057030c5cef25874f80beb5dbae25f7d1f4a208ea6647c
-
C:\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exeFilesize
354KB
MD5c7f0b60cb67b263d2d83cf3d7b7689d1
SHA10b90ef666968e5de30d93c8608107879a118b840
SHA25605306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841
SHA512742aaecdd7c0f60dc91094fe3b62c0650760828735aaeaee765af5d074af9ec24f704ffa2e0f2b84be057030c5cef25874f80beb5dbae25f7d1f4a208ea6647c
-
\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exeFilesize
354KB
MD5c7f0b60cb67b263d2d83cf3d7b7689d1
SHA10b90ef666968e5de30d93c8608107879a118b840
SHA25605306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841
SHA512742aaecdd7c0f60dc91094fe3b62c0650760828735aaeaee765af5d074af9ec24f704ffa2e0f2b84be057030c5cef25874f80beb5dbae25f7d1f4a208ea6647c
-
\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exeFilesize
354KB
MD5c7f0b60cb67b263d2d83cf3d7b7689d1
SHA10b90ef666968e5de30d93c8608107879a118b840
SHA25605306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841
SHA512742aaecdd7c0f60dc91094fe3b62c0650760828735aaeaee765af5d074af9ec24f704ffa2e0f2b84be057030c5cef25874f80beb5dbae25f7d1f4a208ea6647c
-
\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exeFilesize
354KB
MD5c7f0b60cb67b263d2d83cf3d7b7689d1
SHA10b90ef666968e5de30d93c8608107879a118b840
SHA25605306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841
SHA512742aaecdd7c0f60dc91094fe3b62c0650760828735aaeaee765af5d074af9ec24f704ffa2e0f2b84be057030c5cef25874f80beb5dbae25f7d1f4a208ea6647c
-
\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exeFilesize
354KB
MD5c7f0b60cb67b263d2d83cf3d7b7689d1
SHA10b90ef666968e5de30d93c8608107879a118b840
SHA25605306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841
SHA512742aaecdd7c0f60dc91094fe3b62c0650760828735aaeaee765af5d074af9ec24f704ffa2e0f2b84be057030c5cef25874f80beb5dbae25f7d1f4a208ea6647c
-
\Windows\Installer\{8AFA70A1-43F9-0928-36E6-22841654EBCB}\syshost.exeFilesize
354KB
MD5c7f0b60cb67b263d2d83cf3d7b7689d1
SHA10b90ef666968e5de30d93c8608107879a118b840
SHA25605306ac3918a6f5bf386fed597c86dbeda62f0aa89a3873de41689a99f507841
SHA512742aaecdd7c0f60dc91094fe3b62c0650760828735aaeaee765af5d074af9ec24f704ffa2e0f2b84be057030c5cef25874f80beb5dbae25f7d1f4a208ea6647c
-
memory/316-85-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmpFilesize
8KB
-
memory/576-68-0x0000000000000000-mapping.dmp
-
memory/604-77-0x0000000000000000-mapping.dmp
-
memory/824-76-0x0000000000000000-mapping.dmp
-
memory/968-75-0x0000000000000000-mapping.dmp
-
memory/1036-79-0x0000000000000000-mapping.dmp
-
memory/1360-74-0x0000000000000000-mapping.dmp
-
memory/1372-80-0x0000000000000000-mapping.dmp
-
memory/1484-73-0x0000000000000000-mapping.dmp
-
memory/1540-56-0x0000000000000000-mapping.dmp
-
memory/1672-62-0x0000000000300000-0x000000000035D000-memory.dmpFilesize
372KB
-
memory/1672-70-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1672-64-0x0000000000220000-0x0000000000226000-memory.dmpFilesize
24KB
-
memory/1672-63-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1672-54-0x0000000075111000-0x0000000075113000-memory.dmpFilesize
8KB
-
memory/1716-81-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1716-82-0x00000000002A0000-0x00000000002A6000-memory.dmpFilesize
24KB
-
memory/1716-83-0x0000000001FE0000-0x000000000203D000-memory.dmpFilesize
372KB
-
memory/1716-84-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1716-66-0x0000000000000000-mapping.dmp
-
memory/1720-61-0x0000000000A40000-0x0000000000A9D000-memory.dmpFilesize
372KB
-
memory/1780-72-0x0000000000000000-mapping.dmp
-
memory/1820-71-0x0000000000000000-mapping.dmp
-
memory/1920-78-0x0000000000000000-mapping.dmp