Analysis
-
max time kernel
146s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe
Resource
win10v2004-20220901-en
General
-
Target
7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe
-
Size
304KB
-
MD5
10b9f58bc5186e251dd106b9a967dbf6
-
SHA1
c091c0eaccd0a770b8df622cb3faf5b189e5fdcf
-
SHA256
7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071
-
SHA512
21c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60
-
SSDEEP
3072:JRj2d7pRRRMRRRb7HietvTss3XXD8Eq3GBsoeswwA/mdm04yKr7Td6:yp7eHtHEgD8Eq8E3Gm04yG
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\svchost.exe = "C:\\Windows\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MicrosoftCorp = "C:\\Windows\\svchost.exe" 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe -
Executes dropped EXE 2 IoCs
pid Process 1772 svchost.exe 280 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\sysdiag64.exe = "C:\\Windows\\svchost.exe" 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftNAPC = "C:\\Windows\\svchost.exe" 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 748 set thread context of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 1772 set thread context of 280 1772 svchost.exe 38 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\svchost.exe 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe File opened for modification C:\Windows\svchost.exe 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 884 reg.exe 876 reg.exe 1968 reg.exe 1868 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 1772 svchost.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 748 wrote to memory of 1948 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 27 PID 748 wrote to memory of 1948 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 27 PID 748 wrote to memory of 1948 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 27 PID 748 wrote to memory of 1948 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 27 PID 748 wrote to memory of 988 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 28 PID 748 wrote to memory of 988 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 28 PID 748 wrote to memory of 988 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 28 PID 748 wrote to memory of 988 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 28 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 748 wrote to memory of 1068 748 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 30 PID 988 wrote to memory of 884 988 cmd.exe 32 PID 988 wrote to memory of 884 988 cmd.exe 32 PID 988 wrote to memory of 884 988 cmd.exe 32 PID 988 wrote to memory of 884 988 cmd.exe 32 PID 1948 wrote to memory of 876 1948 cmd.exe 33 PID 1948 wrote to memory of 876 1948 cmd.exe 33 PID 1948 wrote to memory of 876 1948 cmd.exe 33 PID 1948 wrote to memory of 876 1948 cmd.exe 33 PID 1068 wrote to memory of 1772 1068 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 34 PID 1068 wrote to memory of 1772 1068 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 34 PID 1068 wrote to memory of 1772 1068 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 34 PID 1068 wrote to memory of 1772 1068 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 34 PID 1772 wrote to memory of 1208 1772 svchost.exe 35 PID 1772 wrote to memory of 1208 1772 svchost.exe 35 PID 1772 wrote to memory of 1208 1772 svchost.exe 35 PID 1772 wrote to memory of 1208 1772 svchost.exe 35 PID 1772 wrote to memory of 1064 1772 svchost.exe 36 PID 1772 wrote to memory of 1064 1772 svchost.exe 36 PID 1772 wrote to memory of 1064 1772 svchost.exe 36 PID 1772 wrote to memory of 1064 1772 svchost.exe 36 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1772 wrote to memory of 280 1772 svchost.exe 38 PID 1208 wrote to memory of 1868 1208 cmd.exe 41 PID 1208 wrote to memory of 1868 1208 cmd.exe 41 PID 1208 wrote to memory of 1868 1208 cmd.exe 41 PID 1208 wrote to memory of 1868 1208 cmd.exe 41 PID 1064 wrote to memory of 1968 1064 cmd.exe 40 PID 1064 wrote to memory of 1968 1064 cmd.exe 40 PID 1064 wrote to memory of 1968 1064 cmd.exe 40 PID 1064 wrote to memory of 1968 1064 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe"C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- Modifies registry key
PID:876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe:*:Enabled:Windows Messanger" /f2⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- Modifies registry key
PID:884
-
-
-
C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe"C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\svchost.exe" /t REG_SZ /d "C:\Windows\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\svchost.exe" /t REG_SZ /d "C:\Windows\svchost.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1968
-
-
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:280
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD510b9f58bc5186e251dd106b9a967dbf6
SHA1c091c0eaccd0a770b8df622cb3faf5b189e5fdcf
SHA2567eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071
SHA51221c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60
-
Filesize
304KB
MD510b9f58bc5186e251dd106b9a967dbf6
SHA1c091c0eaccd0a770b8df622cb3faf5b189e5fdcf
SHA2567eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071
SHA51221c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60
-
Filesize
304KB
MD510b9f58bc5186e251dd106b9a967dbf6
SHA1c091c0eaccd0a770b8df622cb3faf5b189e5fdcf
SHA2567eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071
SHA51221c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60