Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 06:29

General

  • Target

    172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe

  • Size

    78KB

  • MD5

    c570ee611c48429227db6e72b023b4f6

  • SHA1

    0ba0db44e366d4f8e1e8f43cfaf3d055dfc56bfd

  • SHA256

    172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21

  • SHA512

    42fa760b5f9fc635e3a909335103df497b0139b8622abd27bdb75e4fe3dd4c74132720ea1912d6e02ea3a077b2db9189c19842981bde3c54f888b795a0bdece3

  • SSDEEP

    1536:dxETPkgcky/Vht7ILmkAP3S3pzJuhyicgcqd33+9fAbsZ7Yg53zf:dWT3yCfnZfucU3s+q8g53zf

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe
    "C:\Users\Admin\AppData\Local\Temp\172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1668
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "SRDSL"
    1⤵
      PID:684
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "SRDSL"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Windows\SysWOW64\SRDSL.exe
        C:\Windows\system32\SRDSL.exe "c:\users\admin\appdata\local\temp\7077780.dll",MainThread
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1232

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\SRDSL.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Windows\SysWOW64\SRDSL.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • \??\c:\users\admin\appdata\local\temp\7077780.dll

      Filesize

      29KB

      MD5

      02bdf4e206012745b6b563bdf4a8de8c

      SHA1

      d0a515b269a7219bd1441f55b0fd3356fdd34503

      SHA256

      f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f

      SHA512

      35edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63

    • \Users\Admin\AppData\Local\Temp\7077780.dll

      Filesize

      29KB

      MD5

      02bdf4e206012745b6b563bdf4a8de8c

      SHA1

      d0a515b269a7219bd1441f55b0fd3356fdd34503

      SHA256

      f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f

      SHA512

      35edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63

    • \Users\Admin\AppData\Local\Temp\7077780.dll

      Filesize

      29KB

      MD5

      02bdf4e206012745b6b563bdf4a8de8c

      SHA1

      d0a515b269a7219bd1441f55b0fd3356fdd34503

      SHA256

      f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f

      SHA512

      35edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63

    • \Users\Admin\AppData\Local\Temp\7077780.dll

      Filesize

      29KB

      MD5

      02bdf4e206012745b6b563bdf4a8de8c

      SHA1

      d0a515b269a7219bd1441f55b0fd3356fdd34503

      SHA256

      f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f

      SHA512

      35edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63

    • \Users\Admin\AppData\Local\Temp\7077780.dll

      Filesize

      29KB

      MD5

      02bdf4e206012745b6b563bdf4a8de8c

      SHA1

      d0a515b269a7219bd1441f55b0fd3356fdd34503

      SHA256

      f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f

      SHA512

      35edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63

    • \Users\Admin\AppData\Local\Temp\7077780.dll

      Filesize

      29KB

      MD5

      02bdf4e206012745b6b563bdf4a8de8c

      SHA1

      d0a515b269a7219bd1441f55b0fd3356fdd34503

      SHA256

      f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f

      SHA512

      35edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63

    • \Users\Admin\AppData\Local\Temp\7077780.dll

      Filesize

      29KB

      MD5

      02bdf4e206012745b6b563bdf4a8de8c

      SHA1

      d0a515b269a7219bd1441f55b0fd3356fdd34503

      SHA256

      f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f

      SHA512

      35edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63

    • \Windows\SysWOW64\SRDSL.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • memory/1668-58-0x0000000000020000-0x0000000000036000-memory.dmp

      Filesize

      88KB

    • memory/1668-62-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/1668-59-0x0000000000020000-0x0000000000036000-memory.dmp

      Filesize

      88KB

    • memory/1668-54-0x0000000075071000-0x0000000075073000-memory.dmp

      Filesize

      8KB

    • memory/1668-57-0x0000000000020000-0x0000000000036000-memory.dmp

      Filesize

      88KB

    • memory/1668-56-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB