Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe
Resource
win10v2004-20220812-en
General
-
Target
c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe
-
Size
40KB
-
MD5
055cb8b653aabbad6567c05935055ac1
-
SHA1
c89a44581ee32f912b0e35b6722a4445442db89e
-
SHA256
c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6
-
SHA512
123187d48d5e516d2b19f211620d2af79b90955dfd4ed42c40c8aaadc87fd2227f52d00e0d6750707e1f66b21ff5333b0e8ab17b6d7d87c59115a5cfa965946b
-
SSDEEP
384:cDg+BMTwGtvpbuHby1eaIH+GeAA9ae27fHqLCQM8/s0I4CVX0ee6NnS6XXGwtTr:Pi0tvVuHbyeayDedwxfHSmRlxS6X2wt/
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{66BEDE2F-35F3-2B1C-B878-B9FD78757E65} c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{66BEDE2F-35F3-2B1C-B878-B9FD78757E65}\stubpath = "%SystemRoot%\\system32\\AYLaunch.exe" c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe -
Deletes itself 1 IoCs
pid Process 904 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\AYLaunch.exe c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe File opened for modification C:\Windows\SysWOW64\AYLaunch.exe c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1380 c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1380 wrote to memory of 952 1380 c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe 27 PID 1380 wrote to memory of 952 1380 c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe 27 PID 1380 wrote to memory of 952 1380 c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe 27 PID 1380 wrote to memory of 952 1380 c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe 27 PID 1380 wrote to memory of 904 1380 c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe 28 PID 1380 wrote to memory of 904 1380 c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe 28 PID 1380 wrote to memory of 904 1380 c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe 28 PID 1380 wrote to memory of 904 1380 c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe"C:\Users\Admin\AppData\Local\Temp\c68a58e7687d8f6bcce408978551522bb96682ee4ed5ce9f9c60be0ce867e4d6.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{66BEDE2F-35F3-2B1C-B878-B9FD78757E65}" /f2⤵PID:952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\C68A58~1.EXE > nul2⤵
- Deletes itself
PID:904
-