Analysis
-
max time kernel
182s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe
Resource
win10v2004-20220812-en
General
-
Target
c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe
-
Size
3.4MB
-
MD5
e4f0038a0855493b3236d32f483538d3
-
SHA1
f9f7d26f7237151dd7000abf4e3cf8f9f2a336c6
-
SHA256
c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705
-
SHA512
1d782515734634278ef872d7ae53425c222e3c2933d69875409b9808f927b5400c477abb5a7f83a0f355e902d216579710f73f5c56c57cc70919580c4135bbc9
-
SSDEEP
49152:bMd7V/fGcwN4GyXjR1x4W6Pcdh6JIKZJL1izAuIUirESzXvi/l1JU+I08b8i1pUG:b4/fGcwN45LDd6JjL1i03a3y18i1gGw
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 3784 svchost.exe 2008 svchost.exe 3748 Keymaker.exe 1708 lsass.exe 4728 lsass.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2472 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 3748 Keymaker.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe" lsass.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3784 set thread context of 2008 3784 svchost.exe 80 PID 1708 set thread context of 4728 1708 lsass.exe 85 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4676 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4676 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3784 svchost.exe 2008 svchost.exe 1708 lsass.exe 4728 lsass.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3596 wrote to memory of 3784 3596 c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe 79 PID 3596 wrote to memory of 3784 3596 c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe 79 PID 3596 wrote to memory of 3784 3596 c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe 79 PID 3784 wrote to memory of 2008 3784 svchost.exe 80 PID 3784 wrote to memory of 2008 3784 svchost.exe 80 PID 3784 wrote to memory of 2008 3784 svchost.exe 80 PID 3784 wrote to memory of 2008 3784 svchost.exe 80 PID 3784 wrote to memory of 2008 3784 svchost.exe 80 PID 3784 wrote to memory of 2008 3784 svchost.exe 80 PID 3784 wrote to memory of 2008 3784 svchost.exe 80 PID 3784 wrote to memory of 2008 3784 svchost.exe 80 PID 3596 wrote to memory of 3748 3596 c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe 81 PID 3596 wrote to memory of 3748 3596 c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe 81 PID 3596 wrote to memory of 3748 3596 c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe 81 PID 2008 wrote to memory of 2472 2008 svchost.exe 82 PID 2008 wrote to memory of 2472 2008 svchost.exe 82 PID 2008 wrote to memory of 2472 2008 svchost.exe 82 PID 2008 wrote to memory of 1708 2008 svchost.exe 84 PID 2008 wrote to memory of 1708 2008 svchost.exe 84 PID 2008 wrote to memory of 1708 2008 svchost.exe 84 PID 1708 wrote to memory of 4728 1708 lsass.exe 85 PID 1708 wrote to memory of 4728 1708 lsass.exe 85 PID 1708 wrote to memory of 4728 1708 lsass.exe 85 PID 1708 wrote to memory of 4728 1708 lsass.exe 85 PID 1708 wrote to memory of 4728 1708 lsass.exe 85 PID 1708 wrote to memory of 4728 1708 lsass.exe 85 PID 1708 wrote to memory of 4728 1708 lsass.exe 85 PID 1708 wrote to memory of 4728 1708 lsass.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe"C:\Users\Admin\AppData\Local\Temp\c7419bd7201f2bb76df1f2a463219209e9e7b8a58b62c7821ca99fa33354d705.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram program = C:\Users\Admin\AppData\Roaming\lsass.exename = Nero mode = ENABLE4⤵
- Modifies Windows Firewall
PID:2472
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe" /d C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe" /d C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4728
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Keymaker.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Keymaker.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3748
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x428 0x4bc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5868e76bc9830820054d3c11501ea3cb5
SHA1f604ed72e576776ccacf90114bdd0a090a407796
SHA256960b857a47c4bd90902c651b7e8abd82589771cea805a7869a729f7ef2d84e10
SHA5121a848d1da000a5c1c4dedabdfee44d87ff893b6cf5651fe47bf781fb1c9778d72bd785ed7704d1ae260de9fbcd52065107d265d5ee6bd0f2ef5d5b6786b13112
-
Filesize
3.1MB
MD5868e76bc9830820054d3c11501ea3cb5
SHA1f604ed72e576776ccacf90114bdd0a090a407796
SHA256960b857a47c4bd90902c651b7e8abd82589771cea805a7869a729f7ef2d84e10
SHA5121a848d1da000a5c1c4dedabdfee44d87ff893b6cf5651fe47bf781fb1c9778d72bd785ed7704d1ae260de9fbcd52065107d265d5ee6bd0f2ef5d5b6786b13112
-
Filesize
308KB
MD521cb364069443782d2467e8bb5a06004
SHA14ef3be65b33aeb58618722edaa583d8f014c1a7f
SHA25633f0b72e285f3cf58b7480ebc18a3a29ce54b46172e3c50f2bc5375ac0792c60
SHA51203a515d9f86d70fa12aab4552a6c26db59fc20b7afa6081c62b6772a8c8337535c59d5c79aac631d02337f372c9a6eac8181e48ff0ce67495bff9024a0d2847e
-
Filesize
308KB
MD521cb364069443782d2467e8bb5a06004
SHA14ef3be65b33aeb58618722edaa583d8f014c1a7f
SHA25633f0b72e285f3cf58b7480ebc18a3a29ce54b46172e3c50f2bc5375ac0792c60
SHA51203a515d9f86d70fa12aab4552a6c26db59fc20b7afa6081c62b6772a8c8337535c59d5c79aac631d02337f372c9a6eac8181e48ff0ce67495bff9024a0d2847e
-
Filesize
308KB
MD521cb364069443782d2467e8bb5a06004
SHA14ef3be65b33aeb58618722edaa583d8f014c1a7f
SHA25633f0b72e285f3cf58b7480ebc18a3a29ce54b46172e3c50f2bc5375ac0792c60
SHA51203a515d9f86d70fa12aab4552a6c26db59fc20b7afa6081c62b6772a8c8337535c59d5c79aac631d02337f372c9a6eac8181e48ff0ce67495bff9024a0d2847e
-
Filesize
33KB
MD559c595d1c33069cd60d461b2e1b3c1ca
SHA1aab78d5b0ecb28f1d8d50afdcb65fb4281865d10
SHA256b2cae63d90e2dc9ff5f85e67b3896bbd0cd5680e8feacb9042702529a3bb7d98
SHA5128f6cfdf328a5881a9bbf75f1192c9c0c6cced86f016ee474679bd8b0b1cce86b9b163f63293f6bad96125da38c0620dc5597103cb942fbe6c5452af73838091a
-
Filesize
308KB
MD5d31cd58c6d1b6a0d4c3849e604e5aef9
SHA194a3f92b2e76a3409f3032c2f77cef12517fc6cc
SHA2567194f949aedab829fadb3b41daa6eb86386e289c3e7559d070fb10082892bd56
SHA512cf501b4c5ae917fcc7f708ad0d3d8112641637c89eabdc22cd1525cd02393104852d6c26ab65439c33ff8c1bc83ebdebccdd3c3e1c25cd4172b5b4eb2934ea17
-
Filesize
308KB
MD5d31cd58c6d1b6a0d4c3849e604e5aef9
SHA194a3f92b2e76a3409f3032c2f77cef12517fc6cc
SHA2567194f949aedab829fadb3b41daa6eb86386e289c3e7559d070fb10082892bd56
SHA512cf501b4c5ae917fcc7f708ad0d3d8112641637c89eabdc22cd1525cd02393104852d6c26ab65439c33ff8c1bc83ebdebccdd3c3e1c25cd4172b5b4eb2934ea17
-
Filesize
308KB
MD5d31cd58c6d1b6a0d4c3849e604e5aef9
SHA194a3f92b2e76a3409f3032c2f77cef12517fc6cc
SHA2567194f949aedab829fadb3b41daa6eb86386e289c3e7559d070fb10082892bd56
SHA512cf501b4c5ae917fcc7f708ad0d3d8112641637c89eabdc22cd1525cd02393104852d6c26ab65439c33ff8c1bc83ebdebccdd3c3e1c25cd4172b5b4eb2934ea17