Analysis
-
max time kernel
160s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 02:49
Static task
static1
Behavioral task
behavioral1
Sample
3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe
Resource
win10v2004-20221111-en
General
-
Target
3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe
-
Size
580KB
-
MD5
00f0cdcca1cda1ee6ce6d6672506ec50
-
SHA1
bec4b890460e03e731e48ae4c772adc019a7f4c7
-
SHA256
3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89
-
SHA512
88a2e74419ae2f2f1778ba5568b7731a02f7773d7c25f5deee71553a68a1f4223f27b367ce5bde09532c848230345a37205c5479760e5837cbc42ee3a690076a
-
SSDEEP
12288:jWph2x7Drf4EJRlDOVocKkaWJdacQfaTHIPT9Maj:jWX29D0cRMCKPJcfazIPe
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 688 mscorsvw.exe 460 Process not Found 1632 mscorsvw.exe 1712 mscorsvw.exe 384 mscorsvw.exe 972 mscorsvw.exe 1720 mscorsvw.exe 1540 mscorsvw.exe -
Loads dropped DLL 2 IoCs
pid Process 460 Process not Found 460 Process not Found -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\S-1-5-21-3406023954-474543476-3319432036-1000 mscorsvw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\S-1-5-21-3406023954-474543476-3319432036-1000\EnableNotifications = "0" mscorsvw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\S-1-5-21-3406023954-474543476-3319432036-1000 mscorsvw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\S-1-5-21-3406023954-474543476-3319432036-1000\EnableNotifications = "0" mscorsvw.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\alg.exe 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File created \??\c:\windows\SysWOW64\svchost.vir 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File opened for modification \??\c:\windows\system32\svchost.exe 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File opened for modification \??\c:\windows\system32\alg.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\svchost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\alg.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe mscorsvw.exe File created \??\c:\windows\system32\alg.vir 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\svchost.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\alg.exe 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\fxssvc.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\dllhost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\lsass.exe mscorsvw.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe mscorsvw.exe File created \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.vir mscorsvw.exe -
Drops file in Windows directory 29 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehsched.exe mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.vir 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File created \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.vir 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe mscorsvw.exe File created \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.vir 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.vir 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File created \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.vir 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe mscorsvw.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1760 3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe Token: SeTakeOwnershipPrivilege 688 mscorsvw.exe Token: SeTakeOwnershipPrivilege 1632 mscorsvw.exe Token: SeShutdownPrivilege 1712 mscorsvw.exe Token: SeShutdownPrivilege 1712 mscorsvw.exe Token: SeTakeOwnershipPrivilege 1712 mscorsvw.exe Token: SeShutdownPrivilege 1712 mscorsvw.exe Token: SeShutdownPrivilege 1712 mscorsvw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1712 wrote to memory of 972 1712 mscorsvw.exe 33 PID 1712 wrote to memory of 972 1712 mscorsvw.exe 33 PID 1712 wrote to memory of 972 1712 mscorsvw.exe 33 PID 1712 wrote to memory of 972 1712 mscorsvw.exe 33 PID 1712 wrote to memory of 1720 1712 mscorsvw.exe 34 PID 1712 wrote to memory of 1720 1712 mscorsvw.exe 34 PID 1712 wrote to memory of 1720 1712 mscorsvw.exe 34 PID 1712 wrote to memory of 1720 1712 mscorsvw.exe 34 PID 1712 wrote to memory of 1540 1712 mscorsvw.exe 35 PID 1712 wrote to memory of 1540 1712 mscorsvw.exe 35 PID 1712 wrote to memory of 1540 1712 mscorsvw.exe 35 PID 1712 wrote to memory of 1540 1712 mscorsvw.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe"C:\Users\Admin\AppData\Local\Temp\3ce29e0042c612438e9d694a7b8a66399f1367cc84911fc5cfaa52bbc72afd89.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:688
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1bc -InterruptEvent 1ac -NGENProcess 1a8 -Pipe 1b8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:972
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b4 -InterruptEvent 228 -NGENProcess 230 -Pipe 234 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1720
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 230 -InterruptEvent 1c4 -NGENProcess 1b4 -Pipe 228 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1540
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
PID:384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
590KB
MD5e3b2b22df588f2f654abc76247f6f5af
SHA129ffc986d38fe49cd13fb8dc8db54fc864787cef
SHA256df85ea42a8a2f1f59b913cd1c4aebdbfb46f8e61de61701f104ca9fca4f6dc4c
SHA5124c5fa69aed4b6ed97829abe5de681c451f4eb00a81b819daf60825b52c93fbfc8d8c6de2602defd247923720f86e4ec97c094d3bf3d72d78a800f20c3128a315
-
Filesize
590KB
MD5e3b2b22df588f2f654abc76247f6f5af
SHA129ffc986d38fe49cd13fb8dc8db54fc864787cef
SHA256df85ea42a8a2f1f59b913cd1c4aebdbfb46f8e61de61701f104ca9fca4f6dc4c
SHA5124c5fa69aed4b6ed97829abe5de681c451f4eb00a81b819daf60825b52c93fbfc8d8c6de2602defd247923720f86e4ec97c094d3bf3d72d78a800f20c3128a315
-
Filesize
618KB
MD500774929197488514aab87354012feb7
SHA1705df4b0a06f2b89bd07bd98bd1583354455bcf8
SHA25681834f67b9648ec2004445f6fbb6e8f3347ded0457bac45493e3ac20ae69da60
SHA5126fd1aad3e54ef00676126378af5bd5846dd50859fcbb8cf1c71b5d7cdaec4772ed7ff2bf37cf40b92736878a3eba0dbc2b4eaf73a27e56f8ab235f221d0640e0
-
Filesize
567KB
MD57248afabcd566bb8c15f13f415153453
SHA1dce33c8f450d616e8961f3e8059beaea748536e0
SHA256c2e10cdf7099844d14ace70dcc51b62ec5aa3f020ab594d3d84034c1a527f459
SHA512ea77d28b9ce5767bc16822967ef410bd5fadc69fa78549a870fdbf49913ee42861c6a74208657acb7c2841981f5dc5de9bcbb3f20b943846e43f69a8d1daab80
-
Filesize
567KB
MD57248afabcd566bb8c15f13f415153453
SHA1dce33c8f450d616e8961f3e8059beaea748536e0
SHA256c2e10cdf7099844d14ace70dcc51b62ec5aa3f020ab594d3d84034c1a527f459
SHA512ea77d28b9ce5767bc16822967ef410bd5fadc69fa78549a870fdbf49913ee42861c6a74208657acb7c2841981f5dc5de9bcbb3f20b943846e43f69a8d1daab80
-
Filesize
598KB
MD5510ea6ee29f4352f27ff3be0c453f5db
SHA19ffd01485e6c08be6a2f5d3914cb1e75e8d965f1
SHA25647869352686b853c6742bbcae228ba8e3facb0fa59f4182526cd188e892adcb2
SHA512833344d48764c1356f39fa9033738cd59329752feadeb29848c9c25d474e7064cf9801c97ce2ed756ee592f0dc8ff46962f9c8a639d682ceea0aec691075e380
-
Filesize
598KB
MD5510ea6ee29f4352f27ff3be0c453f5db
SHA19ffd01485e6c08be6a2f5d3914cb1e75e8d965f1
SHA25647869352686b853c6742bbcae228ba8e3facb0fa59f4182526cd188e892adcb2
SHA512833344d48764c1356f39fa9033738cd59329752feadeb29848c9c25d474e7064cf9801c97ce2ed756ee592f0dc8ff46962f9c8a639d682ceea0aec691075e380
-
Filesize
598KB
MD5510ea6ee29f4352f27ff3be0c453f5db
SHA19ffd01485e6c08be6a2f5d3914cb1e75e8d965f1
SHA25647869352686b853c6742bbcae228ba8e3facb0fa59f4182526cd188e892adcb2
SHA512833344d48764c1356f39fa9033738cd59329752feadeb29848c9c25d474e7064cf9801c97ce2ed756ee592f0dc8ff46962f9c8a639d682ceea0aec691075e380
-
Filesize
598KB
MD5510ea6ee29f4352f27ff3be0c453f5db
SHA19ffd01485e6c08be6a2f5d3914cb1e75e8d965f1
SHA25647869352686b853c6742bbcae228ba8e3facb0fa59f4182526cd188e892adcb2
SHA512833344d48764c1356f39fa9033738cd59329752feadeb29848c9c25d474e7064cf9801c97ce2ed756ee592f0dc8ff46962f9c8a639d682ceea0aec691075e380
-
Filesize
598KB
MD5510ea6ee29f4352f27ff3be0c453f5db
SHA19ffd01485e6c08be6a2f5d3914cb1e75e8d965f1
SHA25647869352686b853c6742bbcae228ba8e3facb0fa59f4182526cd188e892adcb2
SHA512833344d48764c1356f39fa9033738cd59329752feadeb29848c9c25d474e7064cf9801c97ce2ed756ee592f0dc8ff46962f9c8a639d682ceea0aec691075e380
-
Filesize
528KB
MD583134ec1a34564217c064a3e9c07d11a
SHA139fd3ddc6feec15eb368981f888253ef57310d39
SHA256c39265b70e18c6dc3b36e1c846753ac4c23dba9471930d0d06d4b2cefa7abd1b
SHA512109b41525993351665cb9644acc857de90f84908dffd35da15eee14194bed187d8faf19bb61e0b5ff172d3bae606c19b8dabb6c08a1943f68ab84dde722db8e6
-
Filesize
544KB
MD5eec3b358f124dad53bede610ee3a9f35
SHA1336ff5d68794d8fe61726fadb18651cf37d6166a
SHA25617b2258a6508a90f631b62a90ff3f11805a8918cc192c042bed8571f69a4f1c9
SHA512aadc555443021196f06d8dc5975270551ee7c819ef6606b854bf5e9ec87dd53808c5e4b4ad004db6686b1b30f59a739fb61a9a7da7001e3951cd89a39b10fc0d
-
Filesize
585KB
MD57e128165a8319dd780c54832941e75e7
SHA18762df9deaefed0114aad58d1906e11742a81efd
SHA256c7b3867d4707db57ab22e5cad5f9162d777828d673534b9d0506dd8406017469
SHA512f54d0f4af637c0cb9b3462b059f7d86b8a517e2de36125a41e1122e55c622a00735ae10ebeaadc92aaa20dc37b2412f951fba1bf0cf2a9dadb57e5977ffd1a55
-
Filesize
590KB
MD5e3b2b22df588f2f654abc76247f6f5af
SHA129ffc986d38fe49cd13fb8dc8db54fc864787cef
SHA256df85ea42a8a2f1f59b913cd1c4aebdbfb46f8e61de61701f104ca9fca4f6dc4c
SHA5124c5fa69aed4b6ed97829abe5de681c451f4eb00a81b819daf60825b52c93fbfc8d8c6de2602defd247923720f86e4ec97c094d3bf3d72d78a800f20c3128a315
-
Filesize
590KB
MD5e3b2b22df588f2f654abc76247f6f5af
SHA129ffc986d38fe49cd13fb8dc8db54fc864787cef
SHA256df85ea42a8a2f1f59b913cd1c4aebdbfb46f8e61de61701f104ca9fca4f6dc4c
SHA5124c5fa69aed4b6ed97829abe5de681c451f4eb00a81b819daf60825b52c93fbfc8d8c6de2602defd247923720f86e4ec97c094d3bf3d72d78a800f20c3128a315
-
Filesize
618KB
MD500774929197488514aab87354012feb7
SHA1705df4b0a06f2b89bd07bd98bd1583354455bcf8
SHA25681834f67b9648ec2004445f6fbb6e8f3347ded0457bac45493e3ac20ae69da60
SHA5126fd1aad3e54ef00676126378af5bd5846dd50859fcbb8cf1c71b5d7cdaec4772ed7ff2bf37cf40b92736878a3eba0dbc2b4eaf73a27e56f8ab235f221d0640e0