Analysis
-
max time kernel
276s -
max time network
350s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 01:50
Behavioral task
behavioral1
Sample
8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe
Resource
win7-20220812-en
General
-
Target
8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe
-
Size
34KB
-
MD5
3addd22d60cfcbaa1226e6740527f2d7
-
SHA1
41b37a1d1b6398ed5bb6ffd11b08786a31fa2d87
-
SHA256
8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f
-
SHA512
f601de3f430581db210a5285b73a07f906ccb74bc2c8fe6d19650537aab38262ec11d5c89fcb0f27a36118a46243c69e4f36e992029a7371a1cb228d312181db
-
SSDEEP
768:d7YzkHpKg7e/GAJQdEzpRlbRvB/z8L7mjLiZWM:dpHrTAfpRBRJ/z8L7ALiZW
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral2/memory/1008-132-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/1008-137-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 812 rundll32.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\ksuser.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe File created C:\Windows\SysWOW64\midimap.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe File created C:\Windows\SysWOW64\sysapp1.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe File created C:\Windows\SysWOW64\yuksuser.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe File created C:\Windows\SysWOW64\yumidimap.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe File created C:\Windows\SysWOW64\yumsimg32.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe File created C:\Windows\SysWOW64\msimg32.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2344 sc.exe 3068 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1008 wrote to memory of 3604 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 82 PID 1008 wrote to memory of 3604 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 82 PID 1008 wrote to memory of 3604 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 82 PID 1008 wrote to memory of 2344 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 83 PID 1008 wrote to memory of 2344 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 83 PID 1008 wrote to memory of 2344 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 83 PID 1008 wrote to memory of 3068 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 85 PID 1008 wrote to memory of 3068 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 85 PID 1008 wrote to memory of 3068 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 85 PID 1008 wrote to memory of 812 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 88 PID 1008 wrote to memory of 812 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 88 PID 1008 wrote to memory of 812 1008 8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe 88 PID 3604 wrote to memory of 3436 3604 net.exe 90 PID 3604 wrote to memory of 3436 3604 net.exe 90 PID 3604 wrote to memory of 3436 3604 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe"C:\Users\Admin\AppData\Local\Temp\8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵PID:3436
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
PID:2344
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
PID:3068
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1670681350.dat, ServerMain c:\users\admin\appdata\local\temp\8367323841b0d0b1cd9db841364e1ed0cd0095846ebda06ecefcb69998a6bb0f.exe2⤵
- Loads dropped DLL
PID:812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD55afc45866037cd9d8d51a076eb35c933
SHA15800d4ca69501a584baed23eeb32dcadb71de6bd
SHA256e6b64cc9ff63d2af0e1ddd1c7d291eb033b6525a04f5f049de9c5b8ffe568c3e
SHA512e3926e4265a36878636f4787937ad9f6bc6f451b7f9979a912c0d0eb5aa4b8b490b42ee7cec25bc89af83ded119ac49e09d299c4f06f5c926e40f5631a4628f0
-
Filesize
35KB
MD55afc45866037cd9d8d51a076eb35c933
SHA15800d4ca69501a584baed23eeb32dcadb71de6bd
SHA256e6b64cc9ff63d2af0e1ddd1c7d291eb033b6525a04f5f049de9c5b8ffe568c3e
SHA512e3926e4265a36878636f4787937ad9f6bc6f451b7f9979a912c0d0eb5aa4b8b490b42ee7cec25bc89af83ded119ac49e09d299c4f06f5c926e40f5631a4628f0