Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 06:29
Behavioral task
behavioral1
Sample
172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe
Resource
win10v2004-20220812-en
General
-
Target
172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe
-
Size
78KB
-
MD5
c570ee611c48429227db6e72b023b4f6
-
SHA1
0ba0db44e366d4f8e1e8f43cfaf3d055dfc56bfd
-
SHA256
172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21
-
SHA512
42fa760b5f9fc635e3a909335103df497b0139b8622abd27bdb75e4fe3dd4c74132720ea1912d6e02ea3a077b2db9189c19842981bde3c54f888b795a0bdece3
-
SSDEEP
1536:dxETPkgcky/Vht7ILmkAP3S3pzJuhyicgcqd33+9fAbsZ7Yg53zf:dWT3yCfnZfucU3s+q8g53zf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1232 SRDSL.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SRDSL\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7077780.dll" 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe -
Loads dropped DLL 7 IoCs
pid Process 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe 1348 svchost.exe 1348 svchost.exe 1232 SRDSL.exe 1232 SRDSL.exe 1232 SRDSL.exe 1232 SRDSL.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SRDSL.exe svchost.exe File created C:\Windows\SysWOW64\SRDSL.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe Token: SeBackupPrivilege 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe 1668 172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1232 1348 svchost.exe 29 PID 1348 wrote to memory of 1232 1348 svchost.exe 29 PID 1348 wrote to memory of 1232 1348 svchost.exe 29 PID 1348 wrote to memory of 1232 1348 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe"C:\Users\Admin\AppData\Local\Temp\172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21.exe"1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1668
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "SRDSL"1⤵PID:684
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "SRDSL"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\SRDSL.exeC:\Windows\system32\SRDSL.exe "c:\users\admin\appdata\local\temp\7077780.dll",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
29KB
MD502bdf4e206012745b6b563bdf4a8de8c
SHA1d0a515b269a7219bd1441f55b0fd3356fdd34503
SHA256f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f
SHA51235edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63
-
Filesize
29KB
MD502bdf4e206012745b6b563bdf4a8de8c
SHA1d0a515b269a7219bd1441f55b0fd3356fdd34503
SHA256f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f
SHA51235edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63
-
Filesize
29KB
MD502bdf4e206012745b6b563bdf4a8de8c
SHA1d0a515b269a7219bd1441f55b0fd3356fdd34503
SHA256f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f
SHA51235edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63
-
Filesize
29KB
MD502bdf4e206012745b6b563bdf4a8de8c
SHA1d0a515b269a7219bd1441f55b0fd3356fdd34503
SHA256f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f
SHA51235edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63
-
Filesize
29KB
MD502bdf4e206012745b6b563bdf4a8de8c
SHA1d0a515b269a7219bd1441f55b0fd3356fdd34503
SHA256f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f
SHA51235edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63
-
Filesize
29KB
MD502bdf4e206012745b6b563bdf4a8de8c
SHA1d0a515b269a7219bd1441f55b0fd3356fdd34503
SHA256f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f
SHA51235edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63
-
Filesize
29KB
MD502bdf4e206012745b6b563bdf4a8de8c
SHA1d0a515b269a7219bd1441f55b0fd3356fdd34503
SHA256f98c3b652a3d3e80335d09b0e5dc5a8bb798c46252478459451ec92527c7318f
SHA51235edbf9c8463a624621d9a08d832c3c45b39b0de0fa80e107729c72919af06b6d945e9e3556ae465d85929e17d67ed6765df322fdd0c2f2b44f9c3af6c1e9e63
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d