Analysis
-
max time kernel
90s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe
Resource
win10v2004-20220901-en
General
-
Target
e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe
-
Size
445KB
-
MD5
994985f5568f7ec753de47f3b021e3d3
-
SHA1
0f68752690ca6441f4b3a606ff601379fbd38eb8
-
SHA256
e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db
-
SHA512
ed045fa77d69d81372bb72365a9d242d47a30fa2b9e68a826ee6547d93f0652573ce3cd77fe894e26f8689b0f5a315c3f296a37a499c2be3a2833c4c2861ac21
-
SSDEEP
12288:UV5qLYvMcwTBq3WULk9cJP3LR2nwlRfODYQ:AqW0TBq3jvLR2wrODYQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3940 bs_server.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created \??\c:\windows\syem32\drives\revres_sb.dll bs_server.exe File created \??\c:\windows\syem32\drives\bs_server.exe cmd.exe File opened for modification \??\c:\windows\syem32\drives\bs_server.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3940 bs_server.exe 3940 bs_server.exe 3940 bs_server.exe 3940 bs_server.exe 3940 bs_server.exe 3940 bs_server.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3940 bs_server.exe Token: SeDebugPrivilege 3940 bs_server.exe Token: SeDebugPrivilege 3940 bs_server.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 428 wrote to memory of 2444 428 e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe 80 PID 428 wrote to memory of 2444 428 e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe 80 PID 428 wrote to memory of 2444 428 e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe 80 PID 3940 wrote to memory of 1680 3940 bs_server.exe 57 PID 3940 wrote to memory of 1076 3940 bs_server.exe 43 PID 3940 wrote to memory of 612 3940 bs_server.exe 3 PID 428 wrote to memory of 1780 428 e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe 83 PID 428 wrote to memory of 1780 428 e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe 83 PID 428 wrote to memory of 1780 428 e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe 83
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe"C:\Users\Admin\AppData\Local\Temp\e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\tem.bat3⤵
- Drops file in Windows directory
PID:2444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\del.bat3⤵PID:1780
-
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1680
-
\??\c:\windows\syem32\drives\bs_server.exec:\windows\syem32\drives\bs_server.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3940
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
445KB
MD5994985f5568f7ec753de47f3b021e3d3
SHA10f68752690ca6441f4b3a606ff601379fbd38eb8
SHA256e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db
SHA512ed045fa77d69d81372bb72365a9d242d47a30fa2b9e68a826ee6547d93f0652573ce3cd77fe894e26f8689b0f5a315c3f296a37a499c2be3a2833c4c2861ac21
-
Filesize
248B
MD5a281b9ad2245d4e7fc2cd68d0b71491a
SHA19f2a1b1adbaa803e0fe63da797ba0bbcdf99f8db
SHA2569fd7970e41ed34ee6e1b87a984bd4a1a7309f29f852f853223478731d9120ffe
SHA512ab52612b8b42e6d7e7b0c977e477deac93f821d32a89793af23c5e0ffcdf0c0a2bbe0968103f20d21b58561fcdc2fa91aa443c20d1a9feca845ba173f79e945e
-
Filesize
160B
MD5d7fd42541f66a27787984f9621c1e4fd
SHA1848876966a37b1b0e692b6a5e6ca00aad77c3dca
SHA2560f48ebae4e6bdeb36a61c8701b508abfd5d05b7cbf58d1772387a69c41397952
SHA5123365f9db7a37b6daa2394467e9c2521a3a52b2dee13cf981a87fb8967f96e96ad4cfeb14c191a7b1e7899b558e41a6eee176fe6f9257a15cd8f74286531b55ff
-
Filesize
445KB
MD5994985f5568f7ec753de47f3b021e3d3
SHA10f68752690ca6441f4b3a606ff601379fbd38eb8
SHA256e5b1ad09aa2d29a063a74b8c328410faa44d63965c150fc4d31ae7d52accb4db
SHA512ed045fa77d69d81372bb72365a9d242d47a30fa2b9e68a826ee6547d93f0652573ce3cd77fe894e26f8689b0f5a315c3f296a37a499c2be3a2833c4c2861ac21