Analysis
-
max time kernel
44s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 01:58
Behavioral task
behavioral1
Sample
90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe
Resource
win7-20221111-en
General
-
Target
90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe
-
Size
32KB
-
MD5
4a6d4ba2ca711b77cc45840752cdc553
-
SHA1
dccb19fddfa83ae14883bffefd599f8e2c3da0c3
-
SHA256
90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310
-
SHA512
8f789946e41770dda1818cefef869ff6be6b14c532c4cb3ef1c1a9b583d7845747c16e0e585013b6eec239faa762eb1452bb5a7a92abfdfb1bcd832d2813a9f4
-
SSDEEP
384:W6DcOHBUDOgHoVfbuhiaPOIyVeRPoNTd0o+vzrkvNO1jhiRacn/xuUua7yO6O6TN:zfmDyOiaWJQto5KvbmV5uUXt6QBZM
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral1/memory/1348-54-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1348-59-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 792 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 792 rundll32.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysapp33.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe File created C:\Windows\SysWOW64\ksuser.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe File created C:\Windows\SysWOW64\yumidimap.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe File created C:\Windows\SysWOW64\msimg32.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe File created C:\Windows\SysWOW64\yumsimg32.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe File created C:\Windows\SysWOW64\yuksuser.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe File created C:\Windows\SysWOW64\midimap.dll 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 676 sc.exe 1216 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1120 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 28 PID 1348 wrote to memory of 1120 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 28 PID 1348 wrote to memory of 1120 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 28 PID 1348 wrote to memory of 1120 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 28 PID 1348 wrote to memory of 676 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 29 PID 1348 wrote to memory of 676 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 29 PID 1348 wrote to memory of 676 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 29 PID 1348 wrote to memory of 676 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 29 PID 1348 wrote to memory of 1216 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 31 PID 1348 wrote to memory of 1216 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 31 PID 1348 wrote to memory of 1216 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 31 PID 1348 wrote to memory of 1216 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 31 PID 1348 wrote to memory of 792 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 34 PID 1348 wrote to memory of 792 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 34 PID 1348 wrote to memory of 792 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 34 PID 1348 wrote to memory of 792 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 34 PID 1348 wrote to memory of 792 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 34 PID 1348 wrote to memory of 792 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 34 PID 1348 wrote to memory of 792 1348 90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe 34 PID 1120 wrote to memory of 892 1120 net.exe 35 PID 1120 wrote to memory of 892 1120 net.exe 35 PID 1120 wrote to memory of 892 1120 net.exe 35 PID 1120 wrote to memory of 892 1120 net.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe"C:\Users\Admin\AppData\Local\Temp\90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵PID:892
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
PID:676
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
PID:1216
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1670416077.dat, ServerMain c:\users\admin\appdata\local\temp\90876aef2f989d57419ae8100fadf0c5b226ce8e3ce28ee0ba24ba12de048310.exe2⤵
- Deletes itself
- Loads dropped DLL
PID:792
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD551081a872d0893eaba8859632d44990d
SHA1e117f915472e8da0dfedb928d84d865ddf51e9de
SHA256eb969d0230aeb8e961e9a997abe717cfa0dba0f767d5b7aa41c722360deec5f8
SHA512dd1dcfebc0b9d6d2ea3232b963968011a836fbb290e3ffd5f69b4e873ed45ba74b8f47fa019271ed855da9705deef728806563b1ed82ec9a6710f11349d422bb
-
Filesize
33KB
MD551081a872d0893eaba8859632d44990d
SHA1e117f915472e8da0dfedb928d84d865ddf51e9de
SHA256eb969d0230aeb8e961e9a997abe717cfa0dba0f767d5b7aa41c722360deec5f8
SHA512dd1dcfebc0b9d6d2ea3232b963968011a836fbb290e3ffd5f69b4e873ed45ba74b8f47fa019271ed855da9705deef728806563b1ed82ec9a6710f11349d422bb