Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe
Resource
win7-20220812-en
General
-
Target
c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe
-
Size
124KB
-
MD5
f18c1777c01789d0a0e149995fff2066
-
SHA1
021ffc155a3c882c5863d12b15d8ac37d50bb242
-
SHA256
c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f
-
SHA512
36b0a596d48ac58359c38beb2e53f339f499fa9064e96abea509a4c1e0bc20ca2cde061e1af3a4069359daa2aad68be254b476703ac30b94f24e17e80c7ee6cd
-
SSDEEP
3072:zAK0CBezOU+8isBve4bF3u5jwaaHw7Koj4rIJ9+8bpb:83z+svb1uzDb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Users\\Admin\\AppData\\Local\\ejfpsxuk\\mpwcgbeb.exe" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1028 eurwidghbtyedett.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mpwcgbeb.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mpwcgbeb.exe svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MpwCgbeb = "C:\\Users\\Admin\\AppData\\Local\\ejfpsxuk\\mpwcgbeb.exe" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe Token: SeDebugPrivilege 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe Token: SeSecurityPrivilege 1976 svchost.exe Token: SeSecurityPrivilege 952 svchost.exe Token: SeDebugPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeSecurityPrivilege 1028 eurwidghbtyedett.exe Token: SeLoadDriverPrivilege 1028 eurwidghbtyedett.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe Token: SeBackupPrivilege 952 svchost.exe Token: SeRestorePrivilege 952 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 756 wrote to memory of 1976 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 28 PID 756 wrote to memory of 1976 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 28 PID 756 wrote to memory of 1976 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 28 PID 756 wrote to memory of 1976 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 28 PID 756 wrote to memory of 1976 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 28 PID 756 wrote to memory of 1976 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 28 PID 756 wrote to memory of 1976 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 28 PID 756 wrote to memory of 1976 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 28 PID 756 wrote to memory of 1976 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 28 PID 756 wrote to memory of 1976 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 28 PID 756 wrote to memory of 952 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 29 PID 756 wrote to memory of 952 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 29 PID 756 wrote to memory of 952 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 29 PID 756 wrote to memory of 952 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 29 PID 756 wrote to memory of 952 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 29 PID 756 wrote to memory of 952 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 29 PID 756 wrote to memory of 952 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 29 PID 756 wrote to memory of 952 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 29 PID 756 wrote to memory of 952 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 29 PID 756 wrote to memory of 952 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 29 PID 756 wrote to memory of 1028 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 30 PID 756 wrote to memory of 1028 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 30 PID 756 wrote to memory of 1028 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 30 PID 756 wrote to memory of 1028 756 c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe"C:\Users\Admin\AppData\Local\Temp\c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Checks BIOS information in registry
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\eurwidghbtyedett.exe"C:\Users\Admin\AppData\Local\Temp\eurwidghbtyedett.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5f18c1777c01789d0a0e149995fff2066
SHA1021ffc155a3c882c5863d12b15d8ac37d50bb242
SHA256c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f
SHA51236b0a596d48ac58359c38beb2e53f339f499fa9064e96abea509a4c1e0bc20ca2cde061e1af3a4069359daa2aad68be254b476703ac30b94f24e17e80c7ee6cd
-
Filesize
124KB
MD5f18c1777c01789d0a0e149995fff2066
SHA1021ffc155a3c882c5863d12b15d8ac37d50bb242
SHA256c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f
SHA51236b0a596d48ac58359c38beb2e53f339f499fa9064e96abea509a4c1e0bc20ca2cde061e1af3a4069359daa2aad68be254b476703ac30b94f24e17e80c7ee6cd
-
Filesize
124KB
MD5f18c1777c01789d0a0e149995fff2066
SHA1021ffc155a3c882c5863d12b15d8ac37d50bb242
SHA256c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f
SHA51236b0a596d48ac58359c38beb2e53f339f499fa9064e96abea509a4c1e0bc20ca2cde061e1af3a4069359daa2aad68be254b476703ac30b94f24e17e80c7ee6cd
-
Filesize
124KB
MD5f18c1777c01789d0a0e149995fff2066
SHA1021ffc155a3c882c5863d12b15d8ac37d50bb242
SHA256c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f
SHA51236b0a596d48ac58359c38beb2e53f339f499fa9064e96abea509a4c1e0bc20ca2cde061e1af3a4069359daa2aad68be254b476703ac30b94f24e17e80c7ee6cd
-
Filesize
124KB
MD5f18c1777c01789d0a0e149995fff2066
SHA1021ffc155a3c882c5863d12b15d8ac37d50bb242
SHA256c5d60ed962af09c1aa32eca24c4a4e392c49f152e724bf5cb4f96fa42875ad8f
SHA51236b0a596d48ac58359c38beb2e53f339f499fa9064e96abea509a4c1e0bc20ca2cde061e1af3a4069359daa2aad68be254b476703ac30b94f24e17e80c7ee6cd