Analysis
-
max time kernel
146s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 20:35
Static task
static1
Behavioral task
behavioral1
Sample
dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe
Resource
win10v2004-20220812-en
General
-
Target
dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe
-
Size
91KB
-
MD5
db67e5310ddfe800fc8f2602c3bee5e0
-
SHA1
8b128e7ea3f736a22cd9ae1a6188102848fa8a42
-
SHA256
dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f
-
SHA512
2a2b62ef4c0dc12004d391aa96a94c905a6271f185f0f81a60b8a7d62ee3f16d17c3de2f56fdfbb764cf1c750832d9f4ea5c1fd30dd4d29a3fd66a553063ddd6
-
SSDEEP
1536:kK7N7e5HvCHs/4h41xG5G92vJMv4Tzwn45W59HkzeLYPL3fVynafqvPdIOU5gF:kKBC5CH+xBIvNfw95YeoLoSqtIz
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe -
Loads dropped DLL 16 IoCs
pid Process 1704 svchost.exe 1704 svchost.exe 1880 svchost.exe 1880 svchost.exe 936 svchost.exe 936 svchost.exe 1788 svchost.exe 1788 svchost.exe 680 svchost.exe 680 svchost.exe 1036 svchost.exe 1036 svchost.exe 1760 svchost.exe 1760 svchost.exe 600 svchost.exe 600 svchost.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nla.dll dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe File opened for modification C:\Windows\SysWOW64\SRService.dll dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe File opened for modification C:\Windows\SysWOW64\Ias.dll dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1176 dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe"C:\Users\Admin\AppData\Local\Temp\dc2c8de97ff83100e0cccdcb1a9629f65001d07935622007c1a37a9e4df3194f.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1704
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1880
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:936
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1788
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:680
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1036
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1760
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043
-
Filesize
91KB
MD566fc3fc552030cd3db46fd6ca97804e3
SHA14fc06465a7577f4fd05523b83debf41388d4bc2e
SHA25641d74d232f9e0faec282aa9990d829ee419306b47cec842dbc7ca48ca28da85d
SHA51206bd30645771056ea71418d0c6fa68df4443290884b94eaf1a0ca460732e636e72cd2630e8ceec9f6c544a3081477e2f9828821e065f794099de0c4baf7ae043