Analysis
-
max time kernel
71s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 06:00
Behavioral task
behavioral1
Sample
078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe
Resource
win10v2004-20220812-en
General
-
Target
078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe
-
Size
53KB
-
MD5
a3e04bbed3d52a5489f9c8f008f00abb
-
SHA1
53fbeab1b307d219a832dffce04ff6766a07123f
-
SHA256
078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf
-
SHA512
b9b348c008fc94c01fd27000f2990391a4682b83b865aefe74bdca700ad3d645f458d7ba36cef2d9ecc8d3e3ab2693ca809b85fae21f7c51d9466dbe630deae6
-
SSDEEP
768:al6Fe6EshVE1xoOhcK4dckK48hbjncEn1VInpUdPYCVkbsnnf5WLs1nNxmha5j:Re1shVEoyp4dg4+7cu1EWdNyswLs1mM
Malware Config
Signatures
-
Processes:
resource yara_rule \Windows\SysWOW64\SysAnti.exe aspack_v212_v242 \Windows\SysWOW64\SysAnti.exe aspack_v212_v242 C:\Windows\SysWOW64\SysAnti.exe aspack_v212_v242 C:\Windows\SysWOW64\SysAnti.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
SysAnti.exepid process 564 SysAnti.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1528 cmd.exe -
Loads dropped DLL 4 IoCs
Processes:
Rundll32.exe078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exeRundll32.exepid process 1376 Rundll32.exe 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe 696 Rundll32.exe -
Drops file in System32 directory 3 IoCs
Processes:
078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exeSysAnti.exedescription ioc process File opened for modification C:\Windows\SysWOW64\SysAnti.exe 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe File created C:\Windows\SysWOW64\SysAnti.exe 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe File opened for modification C:\Windows\SysWOW64\SysAnti.exe SysAnti.exe -
Drops file in Windows directory 6 IoCs
Processes:
Rundll32.exe078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exeRundll32.exeSysAnti.exedescription ioc process File opened for modification C:\Windows\Fonts\jikx.fon Rundll32.exe File created C:\Windows\Fonts\tunsj.fon 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe File created C:\Windows\Fonts\uods.fon Rundll32.exe File opened for modification C:\Windows\Fonts\uods.fon Rundll32.exe File created C:\Windows\Fonts\snnfl.fon SysAnti.exe File created C:\Windows\Fonts\jikx.fon Rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exeSysAnti.exepid process 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe 564 SysAnti.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 464 464 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exeRundll32.exeSysAnti.exeRundll32.exedescription pid process Token: SeDebugPrivilege 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe Token: SeDebugPrivilege 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe Token: SeDebugPrivilege 1376 Rundll32.exe Token: SeDebugPrivilege 564 SysAnti.exe Token: SeDebugPrivilege 564 SysAnti.exe Token: SeDebugPrivilege 696 Rundll32.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exeSysAnti.exedescription pid process target process PID 1372 wrote to memory of 1376 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe Rundll32.exe PID 1372 wrote to memory of 1376 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe Rundll32.exe PID 1372 wrote to memory of 1376 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe Rundll32.exe PID 1372 wrote to memory of 1376 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe Rundll32.exe PID 1372 wrote to memory of 1376 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe Rundll32.exe PID 1372 wrote to memory of 1376 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe Rundll32.exe PID 1372 wrote to memory of 1376 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe Rundll32.exe PID 1372 wrote to memory of 564 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe SysAnti.exe PID 1372 wrote to memory of 564 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe SysAnti.exe PID 1372 wrote to memory of 564 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe SysAnti.exe PID 1372 wrote to memory of 564 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe SysAnti.exe PID 564 wrote to memory of 696 564 SysAnti.exe Rundll32.exe PID 564 wrote to memory of 696 564 SysAnti.exe Rundll32.exe PID 564 wrote to memory of 696 564 SysAnti.exe Rundll32.exe PID 564 wrote to memory of 696 564 SysAnti.exe Rundll32.exe PID 564 wrote to memory of 696 564 SysAnti.exe Rundll32.exe PID 564 wrote to memory of 696 564 SysAnti.exe Rundll32.exe PID 564 wrote to memory of 696 564 SysAnti.exe Rundll32.exe PID 564 wrote to memory of 1464 564 SysAnti.exe cmd.exe PID 564 wrote to memory of 1464 564 SysAnti.exe cmd.exe PID 564 wrote to memory of 1464 564 SysAnti.exe cmd.exe PID 564 wrote to memory of 1464 564 SysAnti.exe cmd.exe PID 1372 wrote to memory of 1528 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe cmd.exe PID 1372 wrote to memory of 1528 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe cmd.exe PID 1372 wrote to memory of 1528 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe cmd.exe PID 1372 wrote to memory of 1528 1372 078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe"C:\Users\Admin\AppData\Local\Temp\078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Rundll32.exeC:\Windows\System32\Rundll32.exe "C:\Windows\Fonts\tunsj.fon",MyKILLEntry2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SysAnti.exeC:\Windows\System32\SysAnti.exe -One2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Rundll32.exeC:\Windows\System32\Rundll32.exe "C:\Windows\Fonts\snnfl.fon",MyKILLEntry3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Windows\SysWOW64\SysAnti.exe" > nul3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe" > nul2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Fonts\snnfl.fonFilesize
14KB
MD52c0bb5c2c1f4a8ec217fd50867908b57
SHA14dd7f870ae7e7833059fd28fb900f3fe38bba64f
SHA256bd200384b301a0ebccd42f1caa6543957a660f32120a02da3a53c4b9d9773bc4
SHA51211fb5f717346c244484d8dd651cc9740dc368e1c6cf0efdfb8d91b6ebca6aa059214221e44ab712d6ebff7e605792ac5b38a5d0116f7ee503edcf438fb3c210b
-
C:\Windows\Fonts\tunsj.fonFilesize
14KB
MD52c0bb5c2c1f4a8ec217fd50867908b57
SHA14dd7f870ae7e7833059fd28fb900f3fe38bba64f
SHA256bd200384b301a0ebccd42f1caa6543957a660f32120a02da3a53c4b9d9773bc4
SHA51211fb5f717346c244484d8dd651cc9740dc368e1c6cf0efdfb8d91b6ebca6aa059214221e44ab712d6ebff7e605792ac5b38a5d0116f7ee503edcf438fb3c210b
-
C:\Windows\SysWOW64\SysAnti.exeFilesize
53KB
MD5a3e04bbed3d52a5489f9c8f008f00abb
SHA153fbeab1b307d219a832dffce04ff6766a07123f
SHA256078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf
SHA512b9b348c008fc94c01fd27000f2990391a4682b83b865aefe74bdca700ad3d645f458d7ba36cef2d9ecc8d3e3ab2693ca809b85fae21f7c51d9466dbe630deae6
-
C:\Windows\SysWOW64\SysAnti.exeFilesize
53KB
MD5a3e04bbed3d52a5489f9c8f008f00abb
SHA153fbeab1b307d219a832dffce04ff6766a07123f
SHA256078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf
SHA512b9b348c008fc94c01fd27000f2990391a4682b83b865aefe74bdca700ad3d645f458d7ba36cef2d9ecc8d3e3ab2693ca809b85fae21f7c51d9466dbe630deae6
-
\Windows\Fonts\snnfl.fonFilesize
14KB
MD52c0bb5c2c1f4a8ec217fd50867908b57
SHA14dd7f870ae7e7833059fd28fb900f3fe38bba64f
SHA256bd200384b301a0ebccd42f1caa6543957a660f32120a02da3a53c4b9d9773bc4
SHA51211fb5f717346c244484d8dd651cc9740dc368e1c6cf0efdfb8d91b6ebca6aa059214221e44ab712d6ebff7e605792ac5b38a5d0116f7ee503edcf438fb3c210b
-
\Windows\Fonts\tunsj.fonFilesize
14KB
MD52c0bb5c2c1f4a8ec217fd50867908b57
SHA14dd7f870ae7e7833059fd28fb900f3fe38bba64f
SHA256bd200384b301a0ebccd42f1caa6543957a660f32120a02da3a53c4b9d9773bc4
SHA51211fb5f717346c244484d8dd651cc9740dc368e1c6cf0efdfb8d91b6ebca6aa059214221e44ab712d6ebff7e605792ac5b38a5d0116f7ee503edcf438fb3c210b
-
\Windows\SysWOW64\SysAnti.exeFilesize
53KB
MD5a3e04bbed3d52a5489f9c8f008f00abb
SHA153fbeab1b307d219a832dffce04ff6766a07123f
SHA256078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf
SHA512b9b348c008fc94c01fd27000f2990391a4682b83b865aefe74bdca700ad3d645f458d7ba36cef2d9ecc8d3e3ab2693ca809b85fae21f7c51d9466dbe630deae6
-
\Windows\SysWOW64\SysAnti.exeFilesize
53KB
MD5a3e04bbed3d52a5489f9c8f008f00abb
SHA153fbeab1b307d219a832dffce04ff6766a07123f
SHA256078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf
SHA512b9b348c008fc94c01fd27000f2990391a4682b83b865aefe74bdca700ad3d645f458d7ba36cef2d9ecc8d3e3ab2693ca809b85fae21f7c51d9466dbe630deae6
-
memory/564-65-0x0000000000000000-mapping.dmp
-
memory/564-74-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/696-69-0x0000000000000000-mapping.dmp
-
memory/696-78-0x0000000000160000-0x0000000000179000-memory.dmpFilesize
100KB
-
memory/696-76-0x0000000000160000-0x0000000000179000-memory.dmpFilesize
100KB
-
memory/1372-72-0x0000000002160000-0x0000000002184000-memory.dmpFilesize
144KB
-
memory/1372-55-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1372-73-0x0000000002160000-0x0000000002184000-memory.dmpFilesize
144KB
-
memory/1372-54-0x0000000075921000-0x0000000075923000-memory.dmpFilesize
8KB
-
memory/1372-77-0x0000000002160000-0x0000000002184000-memory.dmpFilesize
144KB
-
memory/1372-61-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1372-81-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1376-60-0x00000000000F0000-0x0000000000109000-memory.dmpFilesize
100KB
-
memory/1376-56-0x0000000000000000-mapping.dmp
-
memory/1376-62-0x00000000000F0000-0x0000000000109000-memory.dmpFilesize
100KB
-
memory/1464-79-0x0000000000000000-mapping.dmp
-
memory/1528-80-0x0000000000000000-mapping.dmp