Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 22:51

General

  • Target

    b42e1d3653a9becdedd9b18d0bbc9fcef2443781b02178ac27f2867ffb805218.exe

  • Size

    13KB

  • MD5

    0ebd51f064e3849df82269f88864eae0

  • SHA1

    2ee47047e9534c76b49807aaa0dfad1b79002eca

  • SHA256

    b42e1d3653a9becdedd9b18d0bbc9fcef2443781b02178ac27f2867ffb805218

  • SHA512

    1eb9580fa6f6c65080cef20974c23cfdc9a6424d610db62376f8352445974299a192d6f7f182bc2d85aa4f71c59246bdbe7f10e907704657131acc88e76d77ea

  • SSDEEP

    192:CFuzLRhI8dQzI3wxADwQ5s4Y1Uf08TXtNzcJajvo4AbvzJQhbjpBS1mbDAVlDRh:/zLvrT9wnFZ2bcgvU2

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b42e1d3653a9becdedd9b18d0bbc9fcef2443781b02178ac27f2867ffb805218.exe
    "C:\Users\Admin\AppData\Local\Temp\b42e1d3653a9becdedd9b18d0bbc9fcef2443781b02178ac27f2867ffb805218.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c cacls C:\Windows\system32 /e /p everyone:f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Windows\SysWOW64\cacls.exe
        cacls C:\Windows\system32 /e /p everyone:f
        3⤵
          PID:4680
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3324
        • C:\Windows\SysWOW64\cacls.exe
          cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
          3⤵
            PID:5096
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net stop wscsvc
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3816
          • C:\Windows\SysWOW64\net.exe
            net stop wscsvc
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1384
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop wscsvc
              4⤵
                PID:2072
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c net stop SharedAccess
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1112
            • C:\Windows\SysWOW64\net.exe
              net stop SharedAccess
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1912
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop SharedAccess
                4⤵
                  PID:1900
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c sc config sharedaccess start= disabled
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4884
              • C:\Windows\SysWOW64\sc.exe
                sc config sharedaccess start= disabled
                3⤵
                • Launches sc.exe
                PID:4692

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\ope7360.tmp

                  Filesize

                  4.3MB

                  MD5

                  6c7cdd25c2cb0073306eb22aebfc663f

                  SHA1

                  a1eba8ab49272b9852fe6a543677e8af36271248

                  SHA256

                  58280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705

                  SHA512

                  17344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6