Analysis
-
max time kernel
206s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe
Resource
win10v2004-20221111-en
General
-
Target
b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe
-
Size
3.3MB
-
MD5
ccd03c4afd2128a0a1c71ab49354c596
-
SHA1
9a6e93ddeec00aabdc7db78f660dd5fa098d7942
-
SHA256
b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8
-
SHA512
26d6657e6304037ab5ba33167bdf43fd8ab2464b6d05be705c235095a1f5c61ee2de110c13faadcf6c084df1bc0c8be39ddee635f3f66c312a756d9fbb8e3a06
-
SSDEEP
49152:FGoEZ3mIDcDnpjQjzxJ1ULCfRxkZ3XbCTEvKRloeRoP7qImLI6qjrkflwk/exXe+:G2aMSX1LRyxuI0ITcU6qjrkfDbfm
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4644 netsh.exe -
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows32 = "C:\\windows\\system\\win.exe" b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\reg_0007.txt b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\windows\system\win.exe b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe File created C:\windows\system\win.exe b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3396 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3696 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5048 wrote to memory of 812 5048 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 82 PID 5048 wrote to memory of 812 5048 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 82 PID 5048 wrote to memory of 812 5048 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 82 PID 812 wrote to memory of 3696 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 83 PID 812 wrote to memory of 3696 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 83 PID 812 wrote to memory of 3696 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 83 PID 812 wrote to memory of 3396 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 84 PID 812 wrote to memory of 3396 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 84 PID 812 wrote to memory of 3396 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 84 PID 812 wrote to memory of 4228 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 85 PID 812 wrote to memory of 4228 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 85 PID 812 wrote to memory of 4228 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 85 PID 812 wrote to memory of 2316 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 86 PID 812 wrote to memory of 2316 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 86 PID 812 wrote to memory of 2316 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 86 PID 812 wrote to memory of 808 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 88 PID 812 wrote to memory of 808 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 88 PID 812 wrote to memory of 808 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 88 PID 812 wrote to memory of 4644 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 93 PID 812 wrote to memory of 4644 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 93 PID 812 wrote to memory of 4644 812 b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe"C:\Users\Admin\AppData\Local\Temp\b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe"C:\Users\Admin\AppData\Local\Temp\b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\autoexec.bat /sc onstart /ru system3⤵
- Creates scheduled task(s)
PID:3696
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv3⤵
- Launches sc.exe
PID:3396
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f3⤵
- Uses Session Manager for persistence
PID:4228
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f3⤵
- Uses Session Manager for persistence
PID:2316
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f3⤵
- Uses Session Manager for persistence
PID:808
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\windows\system\win.exe RPCCC3⤵
- Modifies Windows Firewall
PID:4644
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD537f6a90f88271dcc71e12fae8b5784ea
SHA1286dac4d4c937605a6104ef90fac18ef4d1f1597
SHA256de7dfa05adab725939bd1c0dff93ba90e17ed58f1d254bce6070c1c328f24fe7
SHA51226c7444a35b797c5e0f5678feb8574bbe81bb8a1ea110fcf8ea25f8fc44b965fcc0eb39301f1bd9370209090b3adcd68c244d479909c9375abfc4321af3ffe59
-
Filesize
3.3MB
MD5ccd03c4afd2128a0a1c71ab49354c596
SHA19a6e93ddeec00aabdc7db78f660dd5fa098d7942
SHA256b87a809cf8c01ca65d410356e48699297a0fe4f0acd76f5bd9cfa8cf309f76a8
SHA51226d6657e6304037ab5ba33167bdf43fd8ab2464b6d05be705c235095a1f5c61ee2de110c13faadcf6c084df1bc0c8be39ddee635f3f66c312a756d9fbb8e3a06