Analysis
-
max time kernel
59s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe
Resource
win10v2004-20221111-en
General
-
Target
b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe
-
Size
23KB
-
MD5
a61a9c393b0040b14726f20aeff6baf6
-
SHA1
660ddbb3f76006e3299be189fba28952e3c61a67
-
SHA256
b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9
-
SHA512
5f6c959267008e2b40fbfd30fec34935dcb7532cd02af30c4e075c84f635a7cbc91224630f09d92e6457f28d6611a50ba718c1d504ad59c96ba56aac3cc3b51b
-
SSDEEP
384:ZkRxAFDAdmVvJDRwawaDp/xtqlIWOG0vgl+v9bvboAVn:ZkRxAF0CJSJa1WOG0vgl+v9bkun
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe -
Deletes itself 1 IoCs
pid Process 328 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1452 svchost.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tapisrv.dll b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe File created C:\Windows\SysWOW64\regsvc.dll b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe File created C:\Windows\SysWOW64\dllcache\regsvc.dll b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe File created C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe File created C:\Windows\SysWOW64\dllcache\FastUserSwitchingCompatibility.dll b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe File opened for modification C:\Windows\SysWOW64\appmgmts.dll b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe File opened for modification C:\Windows\SysWOW64\upnphost.dll b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 328 1676 b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe 29 PID 1676 wrote to memory of 328 1676 b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe 29 PID 1676 wrote to memory of 328 1676 b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe 29 PID 1676 wrote to memory of 328 1676 b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe"C:\Users\Admin\AppData\Local\Temp\b9f29e90fd32514c848e19cbfd8c9a1192b21549974f8678284d1f46321aa9b9.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\NewLog.bat2⤵
- Deletes itself
PID:328
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296B
MD5bad8655fd2a31726c6950dd24e51485d
SHA135b0f9fb75df65177882bfee4014288661c7d1af
SHA256ea21a8e8fce8e875c9e5e1d580f7ef27ce5d9e07507532d53892d7f121c950ba
SHA512156e9afa0b7a7635bfc354cb6e6c132ba075b086dd99c78e36f862610724578c7021bfc3996e1c5542c8f5ef539c50b5c0f4c29efca66f1f5302b7315f991639
-
Filesize
15KB
MD51042fed380d3055f101dffbeb43fad41
SHA133d6d4fd2de44f7a06906a82fa135fc9fa6da4c9
SHA256a78b21fead2a2bf5186a1d740d9dbe9f7781401baf6a8f65d2997c682756da69
SHA5123460ac3fbc87d3e38d324bc8b595072109b1a40af0d532a44c45cb362c3b22c5883868d932024937d9fb9df697699346dac3bd0262bfe09b4c8e08bece5f10a5
-
Filesize
15KB
MD51042fed380d3055f101dffbeb43fad41
SHA133d6d4fd2de44f7a06906a82fa135fc9fa6da4c9
SHA256a78b21fead2a2bf5186a1d740d9dbe9f7781401baf6a8f65d2997c682756da69
SHA5123460ac3fbc87d3e38d324bc8b595072109b1a40af0d532a44c45cb362c3b22c5883868d932024937d9fb9df697699346dac3bd0262bfe09b4c8e08bece5f10a5