Analysis

  • max time kernel
    206s
  • max time network
    226s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 04:26

General

  • Target

    d9e7e9b4314ded85ad94f6ccc68d105dce44ab5b1cfdc122eed8c0c23e64f7ee.exe

  • Size

    29KB

  • MD5

    88c6c7b6d8e0d760b604625e77b86b13

  • SHA1

    6d9803604e2cd6b91e2b4a329e6bf28ac86d035f

  • SHA256

    d9e7e9b4314ded85ad94f6ccc68d105dce44ab5b1cfdc122eed8c0c23e64f7ee

  • SHA512

    a66f78e143ae224faa05cd9ec04ce6f892664cb65458fbf7973bf4300174cb0471ef3c8d5a14b4c22da72881292d8f267dc02f24717504355993030f48cec652

  • SSDEEP

    384:NsBVL6WfBGw34VdiBOjbTtBHV4+1Ikap+xGEG77dsxK0n7mipC0tjZSouW8eal:NItBGw36cBwt+kaT9sY0n7ltjIouWv

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9e7e9b4314ded85ad94f6ccc68d105dce44ab5b1cfdc122eed8c0c23e64f7ee.exe
    "C:\Users\Admin\AppData\Local\Temp\d9e7e9b4314ded85ad94f6ccc68d105dce44ab5b1cfdc122eed8c0c23e64f7ee.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\notepad.exe
      notepad.exe
      2⤵
        PID:4428
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc config ekrn start= disabled
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Windows\SysWOW64\sc.exe
          sc config ekrn start= disabled
          3⤵
          • Launches sc.exe
          PID:3424
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill.exe /im ekrn.exe /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:836
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill.exe /im ekrn.exe /f
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2248
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill.exe /im egui.exe /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill.exe /im egui.exe /f
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1268
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\Windows\tete240658171t.dll testall
        2⤵
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4204
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net stop wscsvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Windows\SysWOW64\net.exe
          net stop wscsvc
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1292
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop wscsvc
            4⤵
              PID:1396
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net stop SharedAccess
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Windows\SysWOW64\net.exe
            net stop SharedAccess
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3140
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop SharedAccess
              4⤵
                PID:2260
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c sc config sharedaccess start= disabled
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1496
            • C:\Windows\SysWOW64\sc.exe
              sc config sharedaccess start= disabled
              3⤵
              • Launches sc.exe
              PID:3340
          • C:\Windows\extext240684812t.exe
            C:\Windows\extext240684812t.exe
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4348
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net stop wscsvc
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4032
              • C:\Windows\SysWOW64\net.exe
                net stop wscsvc
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3960
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop wscsvc
                  5⤵
                    PID:4040
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net stop SharedAccess
                3⤵
                  PID:440
                  • C:\Windows\SysWOW64\net.exe
                    net stop SharedAccess
                    4⤵
                      PID:4716
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop SharedAccess
                        5⤵
                          PID:1376
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config sharedaccess start= disabled
                      3⤵
                        PID:4848
                        • C:\Windows\SysWOW64\sc.exe
                          sc config sharedaccess start= disabled
                          4⤵
                          • Launches sc.exe
                          PID:836
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
                        3⤵
                          PID:1248
                          • C:\Windows\SysWOW64\cacls.exe
                            cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
                            4⤵
                              PID:792
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c cacls C:\Windows\system32 /e /p everyone:f
                            3⤵
                              PID:4596
                              • C:\Windows\SysWOW64\cacls.exe
                                cacls C:\Windows\system32 /e /p everyone:f
                                4⤵
                                  PID:5112
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c afc90a.bat
                              2⤵
                                PID:3632

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\afc90a.bat

                              Filesize

                              2KB

                              MD5

                              f3e6c99676b3e634b3c044117875cfa7

                              SHA1

                              37c1ea6674ba428419bd232afc4b0bfa0e48d6a1

                              SHA256

                              1665054630557ea25291efda7572b9d70e32c27d2d04486a878aa7171ce3db52

                              SHA512

                              b5dbce52a2a4f68dcfd408f78c4413256a556fe1b074ee52473f1d4795b03e123504637749b783e7960eae07a889f4c4d758c9fc9dbcd26c62d84391546866b8

                            • C:\Windows\extext240684812t.exe

                              Filesize

                              10KB

                              MD5

                              ac042ed688eb7caa56655f404ff390df

                              SHA1

                              2b6bf1130260c0aa0865ec5644102e2a3b8258b2

                              SHA256

                              579fef0a5cd24f0bd8da5f10f61a841ee7e409066fe8ff180b1515e699d2fe6d

                              SHA512

                              5ba34eea8247d065eccee6ac3ec5a8c542554d2bf8ec110900074d9b8ab60a61b67a042ac3b16d4ba12cfadf2d99a8715e7bc54d9bd2e81a388ff7a8ff0c519d

                            • C:\Windows\extext240684812t.exe

                              Filesize

                              10KB

                              MD5

                              ac042ed688eb7caa56655f404ff390df

                              SHA1

                              2b6bf1130260c0aa0865ec5644102e2a3b8258b2

                              SHA256

                              579fef0a5cd24f0bd8da5f10f61a841ee7e409066fe8ff180b1515e699d2fe6d

                              SHA512

                              5ba34eea8247d065eccee6ac3ec5a8c542554d2bf8ec110900074d9b8ab60a61b67a042ac3b16d4ba12cfadf2d99a8715e7bc54d9bd2e81a388ff7a8ff0c519d

                            • C:\Windows\tete240658171t.dll

                              Filesize

                              36KB

                              MD5

                              2c4156b222b22d48b9fad49d051d1a99

                              SHA1

                              c7ba5cd859de1c79573e4792d8830558f24f7315

                              SHA256

                              f9a62f276e8e5b3cf492ae60dbf363cd9e53a0be46a88a8c3dfe62ad0508edac

                              SHA512

                              a5748948cf104cf3460c5d08bd55125af2d1f2d6d6ca494d756c00c54a8871aee8e6864bd673aa76104c1e8ed273fa9c5f4969ae39017ae84be3f74b5d6e6c31

                            • C:\Windows\tete240658171t.dll

                              Filesize

                              36KB

                              MD5

                              2c4156b222b22d48b9fad49d051d1a99

                              SHA1

                              c7ba5cd859de1c79573e4792d8830558f24f7315

                              SHA256

                              f9a62f276e8e5b3cf492ae60dbf363cd9e53a0be46a88a8c3dfe62ad0508edac

                              SHA512

                              a5748948cf104cf3460c5d08bd55125af2d1f2d6d6ca494d756c00c54a8871aee8e6864bd673aa76104c1e8ed273fa9c5f4969ae39017ae84be3f74b5d6e6c31

                            • memory/1964-137-0x0000000000400000-0x0000000000416000-memory.dmp

                              Filesize

                              88KB

                            • memory/1964-157-0x0000000000400000-0x0000000000416000-memory.dmp

                              Filesize

                              88KB

                            • memory/1964-132-0x0000000000400000-0x0000000000416000-memory.dmp

                              Filesize

                              88KB