Analysis
-
max time kernel
137s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe
Resource
win10v2004-20220901-en
General
-
Target
aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe
-
Size
21KB
-
MD5
d2247e4013aadbffdf7459fd6e229114
-
SHA1
30b466152297653a8a58651cca7cbcba23195e9f
-
SHA256
aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67
-
SHA512
eb9e62e5cb9229c44cd79d1471663855e7109883db08d035d74cb3bfc4ebecee70b5220799d2c15253843c6f883c7a5917f42301ccbd8162fac77f2fa9984a29
-
SSDEEP
384:X3hl3/UDX4yyYE0NksyOgOwCd7cLr+HXWqroWrUIzIv3wkHXSAdYmGurO26:hl3/UDX4yyY1DpwC1cLqGMdA3vUASmG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" svchost.exe -
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\svchost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe:*:Enabled:svchost.exe" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3360 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 476 wrote to memory of 3144 476 aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe 76 PID 476 wrote to memory of 3144 476 aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe 76 PID 476 wrote to memory of 3144 476 aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe 76 PID 476 wrote to memory of 2536 476 aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe 78 PID 476 wrote to memory of 2536 476 aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe 78 PID 476 wrote to memory of 2536 476 aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe 78 PID 2536 wrote to memory of 3360 2536 cmd.exe 80 PID 2536 wrote to memory of 3360 2536 cmd.exe 80 PID 2536 wrote to memory of 3360 2536 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe"C:\Users\Admin\AppData\Local\Temp\aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\cmd.execmd /c copy "C:\Users\Admin\AppData\Local\Temp\aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67.exe" "C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵PID:3144
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Executes dropped EXE
PID:3360
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5d2247e4013aadbffdf7459fd6e229114
SHA130b466152297653a8a58651cca7cbcba23195e9f
SHA256aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67
SHA512eb9e62e5cb9229c44cd79d1471663855e7109883db08d035d74cb3bfc4ebecee70b5220799d2c15253843c6f883c7a5917f42301ccbd8162fac77f2fa9984a29
-
Filesize
21KB
MD5d2247e4013aadbffdf7459fd6e229114
SHA130b466152297653a8a58651cca7cbcba23195e9f
SHA256aaa36171dc2d828846efaa6dfe9baf1cb8b3685a15afbaa725c455c6189f1e67
SHA512eb9e62e5cb9229c44cd79d1471663855e7109883db08d035d74cb3bfc4ebecee70b5220799d2c15253843c6f883c7a5917f42301ccbd8162fac77f2fa9984a29