Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 02:09
Static task
static1
Behavioral task
behavioral1
Sample
7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe
Resource
win10v2004-20220901-en
General
-
Target
7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe
-
Size
304KB
-
MD5
10b9f58bc5186e251dd106b9a967dbf6
-
SHA1
c091c0eaccd0a770b8df622cb3faf5b189e5fdcf
-
SHA256
7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071
-
SHA512
21c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60
-
SSDEEP
3072:JRj2d7pRRRMRRRb7HietvTss3XXD8Eq3GBsoeswwA/mdm04yKr7Td6:yp7eHtHEgD8Eq8E3Gm04yG
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\svchost.exe = "C:\\Windows\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MicrosoftCorp = "C:\\Windows\\svchost.exe" 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe -
Executes dropped EXE 2 IoCs
pid Process 3408 svchost.exe 4888 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysdiag64.exe = "C:\\Windows\\svchost.exe" 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftNAPC = "C:\\Windows\\svchost.exe" 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3412 set thread context of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 3408 set thread context of 4888 3408 svchost.exe 94 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\svchost.exe 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe File opened for modification C:\Windows\svchost.exe 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3200 reg.exe 2400 reg.exe 3380 reg.exe 1860 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 3408 svchost.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3412 wrote to memory of 4468 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 85 PID 3412 wrote to memory of 4468 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 85 PID 3412 wrote to memory of 4468 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 85 PID 3412 wrote to memory of 3816 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 84 PID 3412 wrote to memory of 3816 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 84 PID 3412 wrote to memory of 3816 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 84 PID 3412 wrote to memory of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 3412 wrote to memory of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 3412 wrote to memory of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 3412 wrote to memory of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 3412 wrote to memory of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 3412 wrote to memory of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 3412 wrote to memory of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 3412 wrote to memory of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 3412 wrote to memory of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 3412 wrote to memory of 4648 3412 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 86 PID 4468 wrote to memory of 2400 4468 cmd.exe 90 PID 4468 wrote to memory of 2400 4468 cmd.exe 90 PID 4468 wrote to memory of 2400 4468 cmd.exe 90 PID 3816 wrote to memory of 3200 3816 cmd.exe 89 PID 3816 wrote to memory of 3200 3816 cmd.exe 89 PID 3816 wrote to memory of 3200 3816 cmd.exe 89 PID 4648 wrote to memory of 3408 4648 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 91 PID 4648 wrote to memory of 3408 4648 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 91 PID 4648 wrote to memory of 3408 4648 7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe 91 PID 3408 wrote to memory of 2968 3408 svchost.exe 92 PID 3408 wrote to memory of 2968 3408 svchost.exe 92 PID 3408 wrote to memory of 2968 3408 svchost.exe 92 PID 3408 wrote to memory of 3700 3408 svchost.exe 93 PID 3408 wrote to memory of 3700 3408 svchost.exe 93 PID 3408 wrote to memory of 3700 3408 svchost.exe 93 PID 3408 wrote to memory of 4888 3408 svchost.exe 94 PID 3408 wrote to memory of 4888 3408 svchost.exe 94 PID 3408 wrote to memory of 4888 3408 svchost.exe 94 PID 3408 wrote to memory of 4888 3408 svchost.exe 94 PID 3408 wrote to memory of 4888 3408 svchost.exe 94 PID 3408 wrote to memory of 4888 3408 svchost.exe 94 PID 3408 wrote to memory of 4888 3408 svchost.exe 94 PID 3408 wrote to memory of 4888 3408 svchost.exe 94 PID 3408 wrote to memory of 4888 3408 svchost.exe 94 PID 3408 wrote to memory of 4888 3408 svchost.exe 94 PID 3700 wrote to memory of 3380 3700 cmd.exe 97 PID 3700 wrote to memory of 3380 3700 cmd.exe 97 PID 3700 wrote to memory of 3380 3700 cmd.exe 97 PID 2968 wrote to memory of 1860 2968 cmd.exe 98 PID 2968 wrote to memory of 1860 2968 cmd.exe 98 PID 2968 wrote to memory of 1860 2968 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe"C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe:*:Enabled:Windows Messanger" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- Modifies registry key
PID:3200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- Modifies registry key
PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe"C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\svchost.exe" /t REG_SZ /d "C:\Windows\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\svchost.exe" /t REG_SZ /d "C:\Windows\svchost.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:3380
-
-
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4888
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD510b9f58bc5186e251dd106b9a967dbf6
SHA1c091c0eaccd0a770b8df622cb3faf5b189e5fdcf
SHA2567eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071
SHA51221c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60
-
Filesize
304KB
MD510b9f58bc5186e251dd106b9a967dbf6
SHA1c091c0eaccd0a770b8df622cb3faf5b189e5fdcf
SHA2567eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071
SHA51221c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60
-
Filesize
304KB
MD510b9f58bc5186e251dd106b9a967dbf6
SHA1c091c0eaccd0a770b8df622cb3faf5b189e5fdcf
SHA2567eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071
SHA51221c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60