Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 09:37
Static task
static1
Behavioral task
behavioral1
Sample
a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe
Resource
win10v2004-20221111-en
General
-
Target
a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe
-
Size
78KB
-
MD5
791753ac3f9985e814bb491b3cd98bb6
-
SHA1
0b832a280139237c3078be20da2acd2c69f74d0a
-
SHA256
a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5
-
SHA512
036073c90a33a69ff1bea5e5f05cb46be58251c67632ffad994e61f401f260fd77b91c7edc41ec4f4bfa8586a944a6d0080f2374d18baa5685842f913bb024b9
-
SSDEEP
1536:6HTMQxGoynRLLFXjgRftSsmln/TPMjV5:6zMnjLFyftfmN8V5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 824 svcaycwq.exe -
Deletes itself 1 IoCs
pid Process 700 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svcaycwq.exe a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe File opened for modification C:\Windows\SysWOW64\svcaycwq.exe a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 824 set thread context of 1204 824 svcaycwq.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1380 a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 824 wrote to memory of 1204 824 svcaycwq.exe 28 PID 824 wrote to memory of 1204 824 svcaycwq.exe 28 PID 824 wrote to memory of 1204 824 svcaycwq.exe 28 PID 824 wrote to memory of 1204 824 svcaycwq.exe 28 PID 824 wrote to memory of 1204 824 svcaycwq.exe 28 PID 824 wrote to memory of 1204 824 svcaycwq.exe 28 PID 1380 wrote to memory of 700 1380 a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe 29 PID 1380 wrote to memory of 700 1380 a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe 29 PID 1380 wrote to memory of 700 1380 a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe 29 PID 1380 wrote to memory of 700 1380 a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe"C:\Users\Admin\AppData\Local\Temp\a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\A392C5~1.EXE > nul2⤵
- Deletes itself
PID:700
-
-
C:\Windows\SysWOW64\svcaycwq.exeC:\Windows\SysWOW64\svcaycwq.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1204
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5791753ac3f9985e814bb491b3cd98bb6
SHA10b832a280139237c3078be20da2acd2c69f74d0a
SHA256a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5
SHA512036073c90a33a69ff1bea5e5f05cb46be58251c67632ffad994e61f401f260fd77b91c7edc41ec4f4bfa8586a944a6d0080f2374d18baa5685842f913bb024b9
-
Filesize
78KB
MD5791753ac3f9985e814bb491b3cd98bb6
SHA10b832a280139237c3078be20da2acd2c69f74d0a
SHA256a392c5c2d2da28e4c8c7de69bb112b2648643161d8b11a1c9109baa96f2997e5
SHA512036073c90a33a69ff1bea5e5f05cb46be58251c67632ffad994e61f401f260fd77b91c7edc41ec4f4bfa8586a944a6d0080f2374d18baa5685842f913bb024b9