Analysis

  • max time kernel
    276s
  • max time network
    350s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 01:50

General

  • Target

    8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe

  • Size

    34KB

  • MD5

    3addd22d60cfcbaa1226e6740527f2d7

  • SHA1

    41b37a1d1b6398ed5bb6ffd11b08786a31fa2d87

  • SHA256

    8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f

  • SHA512

    f601de3f430581db210a5285b73a07f906ccb74bc2c8fe6d19650537aab38262ec11d5c89fcb0f27a36118a46243c69e4f36e992029a7371a1cb228d312181db

  • SSDEEP

    768:d7YzkHpKg7e/GAJQdEzpRlbRvB/z8L7mjLiZWM:dpHrTAfpRBRJ/z8L7ALiZW

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe
    "C:\Users\Admin\AppData\Local\Temp\8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Windows\SysWOW64\net.exe
      net stop cryptsvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop cryptsvc
        3⤵
          PID:3436
      • C:\Windows\SysWOW64\sc.exe
        sc config cryptsvc start= disabled
        2⤵
        • Launches sc.exe
        PID:2344
      • C:\Windows\SysWOW64\sc.exe
        sc delete cryptsvc
        2⤵
        • Launches sc.exe
        PID:3068
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Users\Admin\AppData\Local\Temp\1670681350.dat, ServerMain c:\users\admin\appdata\local\temp\8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe
        2⤵
        • Loads dropped DLL
        PID:812

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1670681350.dat

            Filesize

            35KB

            MD5

            5afc45866037cd9d8d51a076eb35c933

            SHA1

            5800d4ca69501a584baed23eeb32dcadb71de6bd

            SHA256

            e6b64cc9ff63d2af0e1ddd1c7d291eb033b6525a04f5f049de9c5b8ffe568c3e

            SHA512

            e3926e4265a36878636f4787937ad9f6bc6f451b7f9979a912c0d0eb5aa4b8b490b42ee7cec25bc89af83ded119ac49e09d299c4f06f5c926e40f5631a4628f0

          • C:\Users\Admin\AppData\Local\Temp\1670681350.dat

            Filesize

            35KB

            MD5

            5afc45866037cd9d8d51a076eb35c933

            SHA1

            5800d4ca69501a584baed23eeb32dcadb71de6bd

            SHA256

            e6b64cc9ff63d2af0e1ddd1c7d291eb033b6525a04f5f049de9c5b8ffe568c3e

            SHA512

            e3926e4265a36878636f4787937ad9f6bc6f451b7f9979a912c0d0eb5aa4b8b490b42ee7cec25bc89af83ded119ac49e09d299c4f06f5c926e40f5631a4628f0

          • memory/1008-132-0x0000000000400000-0x0000000000416000-memory.dmp

            Filesize

            88KB

          • memory/1008-137-0x0000000000400000-0x0000000000416000-memory.dmp

            Filesize

            88KB