Analysis

  • max time kernel
    23s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 06:56

General

  • Target

    c1155b784f302a827ecbaa86e855cb492225ee47930f6c3eedd698c4c65c3fd7.exe

  • Size

    231KB

  • MD5

    6b5e3a54819e74d5caa9ce6a3ac02f2e

  • SHA1

    a6136c3b9b1c490cfd3d11e038ec38362ea52ff1

  • SHA256

    c1155b784f302a827ecbaa86e855cb492225ee47930f6c3eedd698c4c65c3fd7

  • SHA512

    251eb7ec8bda85846d876ecdb2dce7e5a0d09128f7b9058df2dd6be8d89046bed27e60b87df8924a7cdfffca5d30e382c9a4a94d4cf0ad0100754a59873b7920

  • SSDEEP

    6144:YH0e9ZORmJz1eyh4y8D0YHGsV+Ba2wBH2BBu/mxC:jLmXvh4y8JGsV+Ba9WBTc

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 18 IoCs
  • Modifies security service 2 TTPs 26 IoCs
  • Deletes itself 1 IoCs
  • Unexpected DNS network traffic destination 6 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
    • Modifies firewall policy service
    • Modifies security service
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:464
  • C:\Users\Admin\AppData\Local\Temp\c1155b784f302a827ecbaa86e855cb492225ee47930f6c3eedd698c4c65c3fd7.exe
    "C:\Users\Admin\AppData\Local\Temp\c1155b784f302a827ecbaa86e855cb492225ee47930f6c3eedd698c4c65c3fd7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe"
      2⤵
      • Deletes itself
      PID:1364
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1372

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \systemroot\Installer\{bb8ab67a-d838-2496-fd4e-ead6952e3208}\@

          Filesize

          2KB

          MD5

          2454ed4e42e12a396c0368432c89e92a

          SHA1

          e083e5a58a70f1cbb66c09e2b2921316b06f80b5

          SHA256

          86a49493e86cdefcbf7fb231795d3de7418bb97d429eeff44ae578bc9b3b4092

          SHA512

          726aa4014eb3dae9a944faf74d41fa75af157a1bf012e020dcd6d5329f5f4687d6753b34aa1c51f1a05825cdb0a1612bd5d5e2d4d878e7c58970e2d65cdfd26e

        • memory/464-69-0x0000000000240000-0x000000000024F000-memory.dmp

          Filesize

          60KB

        • memory/464-58-0x0000000000230000-0x000000000023F000-memory.dmp

          Filesize

          60KB

        • memory/464-62-0x0000000000230000-0x000000000023F000-memory.dmp

          Filesize

          60KB

        • memory/464-66-0x0000000000230000-0x000000000023F000-memory.dmp

          Filesize

          60KB

        • memory/464-68-0x0000000000080000-0x000000000008B000-memory.dmp

          Filesize

          44KB

        • memory/464-72-0x0000000000080000-0x000000000008B000-memory.dmp

          Filesize

          44KB

        • memory/464-73-0x0000000000240000-0x000000000024F000-memory.dmp

          Filesize

          60KB

        • memory/980-56-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/980-57-0x0000000000260000-0x000000000029C000-memory.dmp

          Filesize

          240KB

        • memory/980-55-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/980-54-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/980-71-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB