Analysis
-
max time kernel
173s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe
Resource
win10v2004-20221111-en
General
-
Target
2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe
-
Size
11KB
-
MD5
03bb1e4a998cf5009e8dd0395cfedc93
-
SHA1
4d6b312e870f1efca63b6370b4cc321bc4ea1c91
-
SHA256
2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3
-
SHA512
f266fe2122d3dcd25b734f8362c1bd8b26fe83b9e5d1114112c8d4db11d342622151a91d66f24b04b7a03235616b21b2f5762daf41e742871c43797c2f0e702a
-
SSDEEP
192:l71EEVqFZquHa/MFS9SvzJQhbjpBS1mbDAVlDRCDU:l71EEsZFWoS9tTDU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RsTray = "C:\\Windows\\system32\\scvhost.exe" 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1572 sc.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1176 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 28 PID 1704 wrote to memory of 1176 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 28 PID 1704 wrote to memory of 1176 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 28 PID 1704 wrote to memory of 1176 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 28 PID 1176 wrote to memory of 1496 1176 cmd.exe 30 PID 1176 wrote to memory of 1496 1176 cmd.exe 30 PID 1176 wrote to memory of 1496 1176 cmd.exe 30 PID 1176 wrote to memory of 1496 1176 cmd.exe 30 PID 1496 wrote to memory of 588 1496 net.exe 31 PID 1496 wrote to memory of 588 1496 net.exe 31 PID 1496 wrote to memory of 588 1496 net.exe 31 PID 1496 wrote to memory of 588 1496 net.exe 31 PID 1704 wrote to memory of 1916 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 32 PID 1704 wrote to memory of 1916 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 32 PID 1704 wrote to memory of 1916 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 32 PID 1704 wrote to memory of 1916 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 32 PID 1916 wrote to memory of 856 1916 cmd.exe 34 PID 1916 wrote to memory of 856 1916 cmd.exe 34 PID 1916 wrote to memory of 856 1916 cmd.exe 34 PID 1916 wrote to memory of 856 1916 cmd.exe 34 PID 856 wrote to memory of 676 856 net.exe 35 PID 856 wrote to memory of 676 856 net.exe 35 PID 856 wrote to memory of 676 856 net.exe 35 PID 856 wrote to memory of 676 856 net.exe 35 PID 1704 wrote to memory of 1416 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 36 PID 1704 wrote to memory of 1416 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 36 PID 1704 wrote to memory of 1416 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 36 PID 1704 wrote to memory of 1416 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 36 PID 1704 wrote to memory of 544 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 37 PID 1704 wrote to memory of 544 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 37 PID 1704 wrote to memory of 544 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 37 PID 1704 wrote to memory of 544 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 37 PID 1704 wrote to memory of 1716 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 39 PID 1704 wrote to memory of 1716 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 39 PID 1704 wrote to memory of 1716 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 39 PID 1704 wrote to memory of 1716 1704 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 39 PID 1416 wrote to memory of 1572 1416 cmd.exe 42 PID 1416 wrote to memory of 1572 1416 cmd.exe 42 PID 1416 wrote to memory of 1572 1416 cmd.exe 42 PID 1416 wrote to memory of 1572 1416 cmd.exe 42 PID 1716 wrote to memory of 1932 1716 cmd.exe 44 PID 1716 wrote to memory of 1932 1716 cmd.exe 44 PID 1716 wrote to memory of 1932 1716 cmd.exe 44 PID 1716 wrote to memory of 1932 1716 cmd.exe 44 PID 544 wrote to memory of 1656 544 cmd.exe 43 PID 544 wrote to memory of 1656 544 cmd.exe 43 PID 544 wrote to memory of 1656 544 cmd.exe 43 PID 544 wrote to memory of 1656 544 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe"C:\Users\Admin\AppData\Local\Temp\2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c net stop wscsvc2⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵PID:588
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:676
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config sharedaccess start= disabled2⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\sc.exesc config sharedaccess start= disabled3⤵
- Launches sc.exe
PID:1572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32 /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32 /e /p everyone:f3⤵PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f3⤵PID:1932
-
-