Analysis
-
max time kernel
39s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe
Resource
win10v2004-20221111-en
General
-
Target
a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe
-
Size
728KB
-
MD5
5ab58dfa5209060ebfda828b0f35d0a4
-
SHA1
9840ac6d20c1eb8c65fa7f0800365dd6bcac4d06
-
SHA256
a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d
-
SHA512
3bd591734dfb5deb522091f692b1e412998631c5757bed2d5b4223487ba808d9a0a9537cee17adbe324ca518ff739fd80bf037b6a4c81439df9edd3c9b8bd8dc
-
SSDEEP
12288:UaK9LotbL8oOu3zf+BQfBuG062RpSAoe+OjLJO+OjbLY+OjS7C+Oj+gQ+Ojw9E+i:UaqotGuwcBu7RToe+OjLJO+OjbLY+Ojk
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1736 svchost.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 852 svchost.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\KernelPort\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\acdev.sys" a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe -
Loads dropped DLL 2 IoCs
pid Process 1736 svchost.exe 1736 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeSecurityPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeTakeOwnershipPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeLoadDriverPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeSystemProfilePrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeSystemtimePrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeProfSingleProcessPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeIncBasePriorityPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeCreatePagefilePrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeBackupPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeRestorePrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeShutdownPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeDebugPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeSystemEnvironmentPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeRemoteShutdownPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeUndockPrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: SeManageVolumePrivilege 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: 33 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: 34 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe Token: 35 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 1552 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1736 1776 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 27 PID 1776 wrote to memory of 1736 1776 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 27 PID 1776 wrote to memory of 1736 1776 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 27 PID 1776 wrote to memory of 1736 1776 a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe 27 PID 1736 wrote to memory of 1552 1736 svchost.exe 28 PID 1736 wrote to memory of 1552 1736 svchost.exe 28 PID 1736 wrote to memory of 1552 1736 svchost.exe 28 PID 1736 wrote to memory of 1552 1736 svchost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe"C:\Users\Admin\AppData\Local\Temp\a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe"C:\Users\Admin\AppData\Local\Temp\a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe"3⤵
- Executes dropped EXE
- Sets service image path in registry
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1552
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe
Filesize693KB
MD5a6a5d6c188985ac6a7eccab08216a830
SHA1f33fde3f6fccd46284d63ccb922a95a237055ac5
SHA256952e7245caeed4faf6adcbb469e9e90043c9e7d3305e4831be28a43d53cb4f77
SHA51288fbfafce4daf14a59402538c9a6718b6d883952e28065fd0389b64df4ddfc34ab9df79a6678741bb17d755d0136bba973c7e444ba3289727af43fb14d116b97
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
\Users\Admin\AppData\Local\Temp\a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe
Filesize693KB
MD5a6a5d6c188985ac6a7eccab08216a830
SHA1f33fde3f6fccd46284d63ccb922a95a237055ac5
SHA256952e7245caeed4faf6adcbb469e9e90043c9e7d3305e4831be28a43d53cb4f77
SHA51288fbfafce4daf14a59402538c9a6718b6d883952e28065fd0389b64df4ddfc34ab9df79a6678741bb17d755d0136bba973c7e444ba3289727af43fb14d116b97
-
\Users\Admin\AppData\Local\Temp\a4607b7016814586d9dc0409b00dd5e51a5a8e4749c12576c9a82db880d9512d.exe
Filesize693KB
MD5a6a5d6c188985ac6a7eccab08216a830
SHA1f33fde3f6fccd46284d63ccb922a95a237055ac5
SHA256952e7245caeed4faf6adcbb469e9e90043c9e7d3305e4831be28a43d53cb4f77
SHA51288fbfafce4daf14a59402538c9a6718b6d883952e28065fd0389b64df4ddfc34ab9df79a6678741bb17d755d0136bba973c7e444ba3289727af43fb14d116b97