Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe
Resource
win10v2004-20220812-en
General
-
Target
fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe
-
Size
370KB
-
MD5
a80bf9cba80fa69b7612b5947b197723
-
SHA1
07622081d530608ac6619b6b25b75a5a7b820cad
-
SHA256
fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
-
SHA512
ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
SSDEEP
6144:3q8UWDkUi7jDLaC7G5QGiUlSFYcH+WNEvWZR+GoqjoOLo6+WYg:RRgUG7aC7G6GQH5NFZR+GooY6Yg
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft RSVP fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft RSVP = "C:\\Users\\Admin\\Local Settings\\Application Data\\Microsoft\\rsvp.exe" fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MessageService fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MessageService = "C:\\ProgramData\\mqtgsvc.exe" fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\dllhst3g.exe fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe File opened for modification C:\Windows\SysWOW64\drivers\RCX7A5.tmp fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe -
Executes dropped EXE 1 IoCs
pid Process 1752 csrss.exe -
Loads dropped DLL 17 IoCs
pid Process 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mstsc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\mstsc.exe" fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Csrss fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Csrss = "C:\\ProgramData\\Microsoft\\csrss.exe" fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mstsc fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe -
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DllHost3g = "C:\\Users\\Admin\\Local Settings\\Application Data\\Microsoft\\Windows\\dllhst3g.exe" fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Csrss fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Csrss = "C:\\ProgramData\\Microsoft\\csrss.exe" fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DllHost3g fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Key created \REGISTRY\USER\.DEFAULT\Software fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1752 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 27 PID 1788 wrote to memory of 1752 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 27 PID 1788 wrote to memory of 1752 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 27 PID 1788 wrote to memory of 1752 1788 fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe"C:\Users\Admin\AppData\Local\Temp\fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e.exe"1⤵
- Adds policy Run key to start application
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\ProgramData\Microsoft\csrss.exeC:\ProgramData\Microsoft\csrss.exe /a 12⤵
- Executes dropped EXE
PID:1752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD579305f9994064022f661b41d59c11ecb
SHA17968047de5497fb94da63acb021622993d5ee91d
SHA256625ee18d9113d5674670c42ec8d0e3fd97bf1c79a8a8d6275bf55d5368a98951
SHA512a667d09f3ef62cc0425be6054e244befc02a73327367fea23ac7d8879625a67d37739f2af3c557ea456837f0af423f2784f5c9a736cace4c18a845574cbd6bf2
-
Filesize
10B
MD5d4a826d51100de961ca6decea8a4e742
SHA1fcce0806c41a590a41f8f8a032902cf38ecc5fbc
SHA256276ced51409f8b16626f524e5cb38d70fcf136915dbaa1c179692ccba6f70bd5
SHA5129c7e2edb5fe1794b883544d76084ae4f975f5dae80c80987cd8a0ee3297e7e9bc4d5cc24e7d364ae439dfc1cc94846bf6627022ddbe96a32a090db172b72d391
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD579305f9994064022f661b41d59c11ecb
SHA17968047de5497fb94da63acb021622993d5ee91d
SHA256625ee18d9113d5674670c42ec8d0e3fd97bf1c79a8a8d6275bf55d5368a98951
SHA512a667d09f3ef62cc0425be6054e244befc02a73327367fea23ac7d8879625a67d37739f2af3c557ea456837f0af423f2784f5c9a736cace4c18a845574cbd6bf2
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5
-
Filesize
370KB
MD5a80bf9cba80fa69b7612b5947b197723
SHA107622081d530608ac6619b6b25b75a5a7b820cad
SHA256fed5e28f5d6ca5f2e7f5a5b60cb1ccabd653fea0053a1cee440f7ee2c9262d6e
SHA512ad761f4b86b52989f091e323dad2ff681a0dc8de1571aa71898d002e8fab0dde431daab8e7334674502bc4caf4d1a7bfdf21a0863335d768f6e042bf627fbbb5