Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 05:08
Static task
static1
Behavioral task
behavioral1
Sample
94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe
Resource
win10v2004-20220812-en
General
-
Target
94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe
-
Size
76KB
-
MD5
e57c118267efc922cc0a239851bf1e30
-
SHA1
010ea211cd93a374c2d588a28e57f60b1f7051b7
-
SHA256
94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb
-
SHA512
da53dfe1b6f6a65eafa4aa7a577083f9639861a8524b8f00e1f420c8493afdbc05296dead1130faea6793ab86399179016179fd18e504418fe07ea935923a240
-
SSDEEP
1536:9iLQekT049P0zK5O/u92pHh9Oqwa1jrc:ssXT0K55+HeaZrc
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Loads dropped DLL 9 IoCs
pid Process 1980 Rundll32.exe 1980 Rundll32.exe 1980 Rundll32.exe 1980 Rundll32.exe 1268 Rundll32.exe 1268 Rundll32.exe 1268 Rundll32.exe 1268 Rundll32.exe 1268 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\nom.dll 94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe File created C:\Windows\SysWOW64\pul.dll 94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe -
Launches sc.exe 20 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1820 sc.exe 1636 sc.exe 1384 sc.exe 1604 sc.exe 360 sc.exe 1552 sc.exe 1368 sc.exe 1536 sc.exe 1748 sc.exe 648 sc.exe 1756 sc.exe 324 sc.exe 824 sc.exe 1692 sc.exe 300 sc.exe 1952 sc.exe 1672 sc.exe 1492 sc.exe 1252 sc.exe 1712 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1980 Rundll32.exe 1980 Rundll32.exe 1980 Rundll32.exe 1980 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 800 94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 800 wrote to memory of 1980 800 94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe 28 PID 800 wrote to memory of 1980 800 94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe 28 PID 800 wrote to memory of 1980 800 94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe 28 PID 800 wrote to memory of 1980 800 94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe 28 PID 800 wrote to memory of 1980 800 94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe 28 PID 800 wrote to memory of 1980 800 94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe 28 PID 800 wrote to memory of 1980 800 94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe 28 PID 1980 wrote to memory of 1368 1980 Rundll32.exe 29 PID 1980 wrote to memory of 1368 1980 Rundll32.exe 29 PID 1980 wrote to memory of 1368 1980 Rundll32.exe 29 PID 1980 wrote to memory of 1368 1980 Rundll32.exe 29 PID 1980 wrote to memory of 1536 1980 Rundll32.exe 30 PID 1980 wrote to memory of 1536 1980 Rundll32.exe 30 PID 1980 wrote to memory of 1536 1980 Rundll32.exe 30 PID 1980 wrote to memory of 1536 1980 Rundll32.exe 30 PID 1980 wrote to memory of 1748 1980 Rundll32.exe 31 PID 1980 wrote to memory of 1748 1980 Rundll32.exe 31 PID 1980 wrote to memory of 1748 1980 Rundll32.exe 31 PID 1980 wrote to memory of 1748 1980 Rundll32.exe 31 PID 1980 wrote to memory of 1492 1980 Rundll32.exe 33 PID 1980 wrote to memory of 1492 1980 Rundll32.exe 33 PID 1980 wrote to memory of 1492 1980 Rundll32.exe 33 PID 1980 wrote to memory of 1492 1980 Rundll32.exe 33 PID 1980 wrote to memory of 1692 1980 Rundll32.exe 34 PID 1980 wrote to memory of 1692 1980 Rundll32.exe 34 PID 1980 wrote to memory of 1692 1980 Rundll32.exe 34 PID 1980 wrote to memory of 1692 1980 Rundll32.exe 34 PID 1980 wrote to memory of 1820 1980 Rundll32.exe 38 PID 1980 wrote to memory of 1820 1980 Rundll32.exe 38 PID 1980 wrote to memory of 1820 1980 Rundll32.exe 38 PID 1980 wrote to memory of 1820 1980 Rundll32.exe 38 PID 1980 wrote to memory of 648 1980 Rundll32.exe 42 PID 1980 wrote to memory of 648 1980 Rundll32.exe 42 PID 1980 wrote to memory of 648 1980 Rundll32.exe 42 PID 1980 wrote to memory of 648 1980 Rundll32.exe 42 PID 1980 wrote to memory of 300 1980 Rundll32.exe 40 PID 1980 wrote to memory of 300 1980 Rundll32.exe 40 PID 1980 wrote to memory of 300 1980 Rundll32.exe 40 PID 1980 wrote to memory of 300 1980 Rundll32.exe 40 PID 1980 wrote to memory of 1756 1980 Rundll32.exe 45 PID 1980 wrote to memory of 1756 1980 Rundll32.exe 45 PID 1980 wrote to memory of 1756 1980 Rundll32.exe 45 PID 1980 wrote to memory of 1756 1980 Rundll32.exe 45 PID 1980 wrote to memory of 324 1980 Rundll32.exe 46 PID 1980 wrote to memory of 324 1980 Rundll32.exe 46 PID 1980 wrote to memory of 324 1980 Rundll32.exe 46 PID 1980 wrote to memory of 324 1980 Rundll32.exe 46 PID 1980 wrote to memory of 360 1980 Rundll32.exe 48 PID 1980 wrote to memory of 360 1980 Rundll32.exe 48 PID 1980 wrote to memory of 360 1980 Rundll32.exe 48 PID 1980 wrote to memory of 360 1980 Rundll32.exe 48 PID 1980 wrote to memory of 1552 1980 Rundll32.exe 49 PID 1980 wrote to memory of 1552 1980 Rundll32.exe 49 PID 1980 wrote to memory of 1552 1980 Rundll32.exe 49 PID 1980 wrote to memory of 1552 1980 Rundll32.exe 49 PID 1980 wrote to memory of 1252 1980 Rundll32.exe 52 PID 1980 wrote to memory of 1252 1980 Rundll32.exe 52 PID 1980 wrote to memory of 1252 1980 Rundll32.exe 52 PID 1980 wrote to memory of 1252 1980 Rundll32.exe 52 PID 1980 wrote to memory of 824 1980 Rundll32.exe 53 PID 1980 wrote to memory of 824 1980 Rundll32.exe 53 PID 1980 wrote to memory of 824 1980 Rundll32.exe 53 PID 1980 wrote to memory of 824 1980 Rundll32.exe 53 PID 1980 wrote to memory of 1636 1980 Rundll32.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe"C:\Users\Admin\AppData\Local\Temp\94bca6065a694200df09742d609e9e1d7304f338aaa819d0fcafa00a5f7ea0eb.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\pul.dll Execute2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\sc.exesc stop 360rp3⤵
- Launches sc.exe
PID:1368
-
-
C:\Windows\SysWOW64\sc.exesc delete 360rp3⤵
- Launches sc.exe
PID:1536
-
-
C:\Windows\SysWOW64\sc.exesc stop RsRavMon3⤵
- Launches sc.exe
PID:1748
-
-
C:\Windows\SysWOW64\sc.exesc delete RsRavMon3⤵
- Launches sc.exe
PID:1492
-
-
C:\Windows\SysWOW64\sc.exesc stop McNASvc3⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\SysWOW64\sc.exesc delete McNASvc3⤵
- Launches sc.exe
PID:1820
-
-
C:\Windows\SysWOW64\sc.exesc delete MpfService3⤵
- Launches sc.exe
PID:300
-
-
C:\Windows\SysWOW64\sc.exesc stop MpfService3⤵
- Launches sc.exe
PID:648
-
-
C:\Windows\SysWOW64\sc.exesc stop McProxy3⤵
- Launches sc.exe
PID:1756
-
-
C:\Windows\SysWOW64\sc.exesc delete McProxy3⤵
- Launches sc.exe
PID:324
-
-
C:\Windows\SysWOW64\sc.exesc stop McShield3⤵
- Launches sc.exe
PID:360
-
-
C:\Windows\SysWOW64\sc.exesc delete McShield3⤵
- Launches sc.exe
PID:1552
-
-
C:\Windows\SysWOW64\sc.exesc stop McODS3⤵
- Launches sc.exe
PID:1252
-
-
C:\Windows\SysWOW64\sc.exesc delete McODS3⤵
- Launches sc.exe
PID:824
-
-
C:\Windows\SysWOW64\sc.exesc stop mcmscsvc3⤵
- Launches sc.exe
PID:1636
-
-
C:\Windows\SysWOW64\sc.exesc delete mcmscsvc3⤵
- Launches sc.exe
PID:1384
-
-
C:\Windows\SysWOW64\sc.exesc delete McSysmon3⤵
- Launches sc.exe
PID:1952
-
-
C:\Windows\SysWOW64\sc.exesc stop McSysmon3⤵
- Launches sc.exe
PID:1672
-
-
C:\Windows\SysWOW64\sc.exesc stop ekrn3⤵
- Launches sc.exe
PID:1604
-
-
C:\Windows\SysWOW64\sc.exesc delete ekrn3⤵
- Launches sc.exe
PID:1712
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\nom.dll Execute2⤵
- Loads dropped DLL
- Adds Run key to start application
PID:1268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD54026288a2daca37ac456f26dc1b713d3
SHA151a7b71868a5b6b8bc1bdf4d587ce03cde608243
SHA256bac1c6fdb89138a479490d2f183a62fe43c8558f0d6e1a93c350ce904f3e11e4
SHA512f7afd568976b1910a0f119fbc9cdce165b754f65828ed4b44ed1ebc06e5bce0df03fc7e786e3c39c325749ab27f514c438f021e65bd1e1acb38db56de5d73165
-
Filesize
24KB
MD51ef60b6f4b5541b61eb3e5afae837b03
SHA19ba9437e8798f1ab0862d96422b0fd1f1a9f23da
SHA25664f2be7a2f6eb7ed52fb191ceb0a122b8144e32ce1b1e9275e00934da42659be
SHA512eaab6bb21ba803ece3a4974874e8fcb5a19f23445be2f6115af8cf05243c2fd4fe575882014bd117b7c2cab74d03b6d298d244f3be293191252fe1fb645a5ac4
-
Filesize
1.7MB
MD5b5eb5bd3066959611e1f7a80fd6cc172
SHA16fb1532059212c840737b3f923a9c0b152c0887a
SHA2561ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc
SHA5126c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6
-
Filesize
8KB
MD54026288a2daca37ac456f26dc1b713d3
SHA151a7b71868a5b6b8bc1bdf4d587ce03cde608243
SHA256bac1c6fdb89138a479490d2f183a62fe43c8558f0d6e1a93c350ce904f3e11e4
SHA512f7afd568976b1910a0f119fbc9cdce165b754f65828ed4b44ed1ebc06e5bce0df03fc7e786e3c39c325749ab27f514c438f021e65bd1e1acb38db56de5d73165
-
Filesize
8KB
MD54026288a2daca37ac456f26dc1b713d3
SHA151a7b71868a5b6b8bc1bdf4d587ce03cde608243
SHA256bac1c6fdb89138a479490d2f183a62fe43c8558f0d6e1a93c350ce904f3e11e4
SHA512f7afd568976b1910a0f119fbc9cdce165b754f65828ed4b44ed1ebc06e5bce0df03fc7e786e3c39c325749ab27f514c438f021e65bd1e1acb38db56de5d73165
-
Filesize
8KB
MD54026288a2daca37ac456f26dc1b713d3
SHA151a7b71868a5b6b8bc1bdf4d587ce03cde608243
SHA256bac1c6fdb89138a479490d2f183a62fe43c8558f0d6e1a93c350ce904f3e11e4
SHA512f7afd568976b1910a0f119fbc9cdce165b754f65828ed4b44ed1ebc06e5bce0df03fc7e786e3c39c325749ab27f514c438f021e65bd1e1acb38db56de5d73165
-
Filesize
8KB
MD54026288a2daca37ac456f26dc1b713d3
SHA151a7b71868a5b6b8bc1bdf4d587ce03cde608243
SHA256bac1c6fdb89138a479490d2f183a62fe43c8558f0d6e1a93c350ce904f3e11e4
SHA512f7afd568976b1910a0f119fbc9cdce165b754f65828ed4b44ed1ebc06e5bce0df03fc7e786e3c39c325749ab27f514c438f021e65bd1e1acb38db56de5d73165
-
Filesize
24KB
MD51ef60b6f4b5541b61eb3e5afae837b03
SHA19ba9437e8798f1ab0862d96422b0fd1f1a9f23da
SHA25664f2be7a2f6eb7ed52fb191ceb0a122b8144e32ce1b1e9275e00934da42659be
SHA512eaab6bb21ba803ece3a4974874e8fcb5a19f23445be2f6115af8cf05243c2fd4fe575882014bd117b7c2cab74d03b6d298d244f3be293191252fe1fb645a5ac4
-
Filesize
24KB
MD51ef60b6f4b5541b61eb3e5afae837b03
SHA19ba9437e8798f1ab0862d96422b0fd1f1a9f23da
SHA25664f2be7a2f6eb7ed52fb191ceb0a122b8144e32ce1b1e9275e00934da42659be
SHA512eaab6bb21ba803ece3a4974874e8fcb5a19f23445be2f6115af8cf05243c2fd4fe575882014bd117b7c2cab74d03b6d298d244f3be293191252fe1fb645a5ac4
-
Filesize
24KB
MD51ef60b6f4b5541b61eb3e5afae837b03
SHA19ba9437e8798f1ab0862d96422b0fd1f1a9f23da
SHA25664f2be7a2f6eb7ed52fb191ceb0a122b8144e32ce1b1e9275e00934da42659be
SHA512eaab6bb21ba803ece3a4974874e8fcb5a19f23445be2f6115af8cf05243c2fd4fe575882014bd117b7c2cab74d03b6d298d244f3be293191252fe1fb645a5ac4
-
Filesize
24KB
MD51ef60b6f4b5541b61eb3e5afae837b03
SHA19ba9437e8798f1ab0862d96422b0fd1f1a9f23da
SHA25664f2be7a2f6eb7ed52fb191ceb0a122b8144e32ce1b1e9275e00934da42659be
SHA512eaab6bb21ba803ece3a4974874e8fcb5a19f23445be2f6115af8cf05243c2fd4fe575882014bd117b7c2cab74d03b6d298d244f3be293191252fe1fb645a5ac4