Analysis
-
max time kernel
334s -
max time network
399s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe
Resource
win10v2004-20221111-en
General
-
Target
2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe
-
Size
11KB
-
MD5
03bb1e4a998cf5009e8dd0395cfedc93
-
SHA1
4d6b312e870f1efca63b6370b4cc321bc4ea1c91
-
SHA256
2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3
-
SHA512
f266fe2122d3dcd25b734f8362c1bd8b26fe83b9e5d1114112c8d4db11d342622151a91d66f24b04b7a03235616b21b2f5762daf41e742871c43797c2f0e702a
-
SSDEEP
192:l71EEVqFZquHa/MFS9SvzJQhbjpBS1mbDAVlDRCDU:l71EEsZFWoS9tTDU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RsTray = "C:\\Windows\\system32\\scvhost.exe" 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3484 sc.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3748 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 83 PID 1048 wrote to memory of 3748 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 83 PID 1048 wrote to memory of 3748 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 83 PID 1048 wrote to memory of 4600 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 85 PID 1048 wrote to memory of 4600 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 85 PID 1048 wrote to memory of 4600 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 85 PID 3748 wrote to memory of 3232 3748 cmd.exe 87 PID 3748 wrote to memory of 3232 3748 cmd.exe 87 PID 3748 wrote to memory of 3232 3748 cmd.exe 87 PID 3232 wrote to memory of 396 3232 net.exe 89 PID 3232 wrote to memory of 396 3232 net.exe 89 PID 3232 wrote to memory of 396 3232 net.exe 89 PID 4600 wrote to memory of 3180 4600 cmd.exe 88 PID 4600 wrote to memory of 3180 4600 cmd.exe 88 PID 4600 wrote to memory of 3180 4600 cmd.exe 88 PID 1048 wrote to memory of 4728 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 90 PID 1048 wrote to memory of 4728 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 90 PID 1048 wrote to memory of 4728 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 90 PID 1048 wrote to memory of 4232 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 94 PID 1048 wrote to memory of 4232 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 94 PID 1048 wrote to memory of 4232 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 94 PID 1048 wrote to memory of 3208 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 92 PID 1048 wrote to memory of 3208 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 92 PID 1048 wrote to memory of 3208 1048 2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe 92 PID 3180 wrote to memory of 1732 3180 net.exe 96 PID 3180 wrote to memory of 1732 3180 net.exe 96 PID 3180 wrote to memory of 1732 3180 net.exe 96 PID 3208 wrote to memory of 3328 3208 cmd.exe 97 PID 3208 wrote to memory of 3328 3208 cmd.exe 97 PID 3208 wrote to memory of 3328 3208 cmd.exe 97 PID 4728 wrote to memory of 3484 4728 cmd.exe 98 PID 4728 wrote to memory of 3484 4728 cmd.exe 98 PID 4728 wrote to memory of 3484 4728 cmd.exe 98 PID 4232 wrote to memory of 4788 4232 cmd.exe 99 PID 4232 wrote to memory of 4788 4232 cmd.exe 99 PID 4232 wrote to memory of 4788 4232 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe"C:\Users\Admin\AppData\Local\Temp\2219584733d48e3484a76a5d6e24ae75b8ba5867fda0f151840832e22b26fbf3.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c net stop wscsvc2⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵PID:396
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1732
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config sharedaccess start= disabled2⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\sc.exesc config sharedaccess start= disabled3⤵
- Launches sc.exe
PID:3484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f3⤵PID:3328
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32 /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32 /e /p everyone:f3⤵PID:4788
-
-