Analysis
-
max time kernel
45s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe
Resource
win10v2004-20220812-en
General
-
Target
c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe
-
Size
181KB
-
MD5
58dc37641751d74c7a14b427a87917a8
-
SHA1
8c4ded583f5e806309240c04c35a58507bd4230f
-
SHA256
c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59
-
SHA512
1653a8b8adca6b0d8f4a0d58216bb940686d6bbcb1cd8dcfa40ee181f45ce6cee1ccdfff135cb3ea34e553b0236d6d2d633b99e8c64611cde31506752586190a
-
SSDEEP
3072:a1wDmmKd/2TMV66KD+ZlU6RDvvvW9tDMtEG0f1exA1eYjYda9wUfIPGZr8i1fyiL:l9MQ69lU4TYwr0f1r1eUb9pfkGh8i1fx
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\GloballyOpenPorts services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable\System services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\AuthorizedApplications services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications services.exe -
Modifies security service 2 TTPs 26 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Type = "32" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSIn services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Security services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Parameters services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Security services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\ErrorControl = "0" services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\ErrorControl = "0" services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\DeleteFlag = "1" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Parameters services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSOut services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\Teredo services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo\0 services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\DeleteFlag = "1" services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Type = "32" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Security services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\ErrorControl = "0" services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\DeleteFlag = "1" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\RPC-EPMap services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Type = "32" services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords services.exe -
Deletes itself 1 IoCs
pid Process 1124 cmd.exe -
Unexpected DNS network traffic destination 6 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini services.exe File created \systemroot\assembly\GAC_32\Desktop.ini services.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1660 set thread context of 1124 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 27 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Installer\{a31e499c-3c7c-222a-40fd-7fc6e142514c}\@ c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 468 services.exe 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe Token: SeDebugPrivilege 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe Token: SeDebugPrivilege 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe Token: SeDebugPrivilege 468 services.exe Token: SeBackupPrivilege 468 services.exe Token: SeRestorePrivilege 468 services.exe Token: SeSecurityPrivilege 468 services.exe Token: SeTakeOwnershipPrivilege 468 services.exe Token: SeBackupPrivilege 468 services.exe Token: SeRestorePrivilege 468 services.exe Token: SeSecurityPrivilege 468 services.exe Token: SeTakeOwnershipPrivilege 468 services.exe Token: SeBackupPrivilege 468 services.exe Token: SeRestorePrivilege 468 services.exe Token: SeSecurityPrivilege 468 services.exe Token: SeTakeOwnershipPrivilege 468 services.exe Token: SeBackupPrivilege 468 services.exe Token: SeRestorePrivilege 468 services.exe Token: SeSecurityPrivilege 468 services.exe Token: SeTakeOwnershipPrivilege 468 services.exe Token: SeBackupPrivilege 468 services.exe Token: SeRestorePrivilege 468 services.exe Token: SeSecurityPrivilege 468 services.exe Token: SeTakeOwnershipPrivilege 468 services.exe Token: SeBackupPrivilege 468 services.exe Token: SeRestorePrivilege 468 services.exe Token: SeSecurityPrivilege 468 services.exe Token: SeTakeOwnershipPrivilege 468 services.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1256 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 16 PID 1660 wrote to memory of 468 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 6 PID 1660 wrote to memory of 1124 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 27 PID 1660 wrote to memory of 1124 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 27 PID 1660 wrote to memory of 1124 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 27 PID 1660 wrote to memory of 1124 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 27 PID 1660 wrote to memory of 1124 1660 c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe 27
Processes
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Modifies firewall policy service
- Modifies security service
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe"C:\Users\Admin\AppData\Local\Temp\c487c034b38da0d62ad30164da4dfb8fba6de9a29a5134d3219bd351a8260d59.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Deletes itself
PID:1124
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD552e50773355022ecf1761ca6ca713d6e
SHA116d896e8050d5b51cf489b87168f1a10c1e5f9ed
SHA256f18f7663854087b420debd10a629819e323275f9292961a200c4314416d3dbc9
SHA5125d12300190af2af4a97d4f889ef06b78aa2b4a5a6902cf434713ec495553d80933f21f0e60d03303b9ee4f2995363e392eb324a1a823f78c5a59765bd9129d72