Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 16:28
Static task
static1
Behavioral task
behavioral1
Sample
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe
Resource
win10v2004-20220812-en
General
-
Target
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe
-
Size
334KB
-
MD5
bbffe40abd328fb813488525582a739c
-
SHA1
e2d911da1f333a890224f5a2a64ff2519ffcd62c
-
SHA256
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac
-
SHA512
6b37392fbdfff463aca6e58a83cbaf7a7da4dddebe09fb0f442e503cda1a3d1c6501e054c6b6c921d1bcfa5bf41f3be9d0ed87cbceec51fe85bd113bf74020b5
-
SSDEEP
6144:P8hbjRDRuvYSggJCsiQbFzjRLdQPanA9fcW7DWaF:P8qYlcCVQbVjNK7/7DWaF
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
description ioc process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{E3694CAA-0B9E-49DB-B0B0-86064FF94103}\\f5ea51da.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{E3694CAA-0B9E-49DB-B0B0-86064FF94103}\\f5ea51da.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exedescription pid process target process PID 2000 set thread context of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 set thread context of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe -
Drops file in Windows directory 1 IoCs
Processes:
description ioc process File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe -
Suspicious behavior: MapViewOfSection 27 IoCs
Processes:
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exesvchost.exepid process 1488 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe 1488 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeDebugPrivilege 1664 svchost.exe Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeRestorePrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeSystemtimePrivilege 880 Token: SeBackupPrivilege 880 Token: SeRestorePrivilege 880 Token: SeShutdownPrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeUndockPrivilege 880 Token: SeManageVolumePrivilege 880 Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeRestorePrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeRestorePrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeAuditPrivilege 880 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1224 1224 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1224 1224 -
Suspicious use of UnmapMainImage 5 IoCs
Processes:
pid process 816 816 816 816 816 -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exeda3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exeda3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.execalc.exedescription pid process target process PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1956 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 2000 wrote to memory of 1488 2000 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe PID 1488 wrote to memory of 1664 1488 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe svchost.exe PID 1488 wrote to memory of 1664 1488 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe svchost.exe PID 1488 wrote to memory of 1664 1488 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe svchost.exe PID 1488 wrote to memory of 1664 1488 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe svchost.exe PID 1956 wrote to memory of 956 1956 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe calc.exe PID 1956 wrote to memory of 956 1956 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe calc.exe PID 1956 wrote to memory of 956 1956 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe calc.exe PID 1956 wrote to memory of 956 1956 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe calc.exe PID 1956 wrote to memory of 956 1956 da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe calc.exe PID 384 wrote to memory of 956 384 calc.exe PID 384 wrote to memory of 1400 384 notepad.exe PID 384 wrote to memory of 1400 384 notepad.exe PID 384 wrote to memory of 1400 384 notepad.exe PID 384 wrote to memory of 1400 384 notepad.exe PID 956 wrote to memory of 1400 956 calc.exe notepad.exe PID 956 wrote to memory of 1400 956 calc.exe notepad.exe PID 956 wrote to memory of 1400 956 calc.exe notepad.exe PID 956 wrote to memory of 1400 956 calc.exe notepad.exe PID 956 wrote to memory of 1400 956 calc.exe notepad.exe PID 384 wrote to memory of 1400 384 notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe"C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe"C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵PID:1400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe"C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-