Analysis
-
max time kernel
161s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 00:56
Behavioral task
behavioral1
Sample
8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe
Resource
win10v2004-20220812-en
General
-
Target
8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe
-
Size
286KB
-
MD5
244d1fbc6fd418449e5a63c641e340dc
-
SHA1
1c162f80ddd6787d03fd33d18d77a520734aedb0
-
SHA256
8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2
-
SHA512
9906e22f0f240be59e1c65d8259466fc4ffb229dbb45aae93740c9ba8e8fe752971971259ecbf95dcf864a4155c9c132f4a4e9caf71f101c33f45cdd4841f714
-
SSDEEP
3072:IAzoG5LG8kk+MxB4c7Cje76y642DgSrojEtOZOcyv9IiwjC:IAzoUGTwxe3eC8QtqOaN
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" servise.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" servise.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 4052 servise.exe -
resource yara_rule behavioral2/memory/1872-133-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1872-135-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/files/0x0008000000022e51-138.dat upx behavioral2/files/0x0008000000022e51-139.dat upx behavioral2/memory/4052-140-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4052-141-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NvCplDeamon = "C:\\WINDOWS\\system\\servise.exe" 8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NvCplDeamon = "C:\\WINDOWS\\system\\servise.exe" servise.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\d.bat 8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe File created C:\WINDOWS\SysWOW64\deb.sys servise.exe File created C:\WINDOWS\SysWOW64\logo.scr servise.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\system\servise.exe 8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe File opened for modification C:\WINDOWS\system\servise.exe 8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveActive = "1" servise.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "120" servise.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\System32\\logo.scr" servise.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1872 8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe 1872 8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe 4052 servise.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1872 wrote to memory of 4040 1872 8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe 81 PID 1872 wrote to memory of 4040 1872 8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe 81 PID 1872 wrote to memory of 4040 1872 8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe 81 PID 4040 wrote to memory of 4052 4040 cmd.exe 83 PID 4040 wrote to memory of 4052 4040 cmd.exe 83 PID 4040 wrote to memory of 4052 4040 cmd.exe 83 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer servise.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" servise.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe"C:\Users\Admin\AppData\Local\Temp\8fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\WINDOWS\system32\d.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\WINDOWS\system\servise.exeC:\WINDOWS\system\servise.exe3⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:4052
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD52c82ed675dd41a9efcd9853c69a7256a
SHA11393008a582e70349b0669e975235c48459419c4
SHA256983649bc9a339035f7a558dfab8678b06b5222d265a21584371d438c8838ffbb
SHA512f8349b5031b7b7f0f91f58fa26053f4efc3106d184df960e2d6dc1bf06dc6c3ffda6817ee0786b4a916ef5d022a9bcfa1bb08a573b20a138e31647ad39c02041
-
Filesize
286KB
MD5244d1fbc6fd418449e5a63c641e340dc
SHA11c162f80ddd6787d03fd33d18d77a520734aedb0
SHA2568fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2
SHA5129906e22f0f240be59e1c65d8259466fc4ffb229dbb45aae93740c9ba8e8fe752971971259ecbf95dcf864a4155c9c132f4a4e9caf71f101c33f45cdd4841f714
-
Filesize
286KB
MD5244d1fbc6fd418449e5a63c641e340dc
SHA11c162f80ddd6787d03fd33d18d77a520734aedb0
SHA2568fae115270d6915f528b818c9085bc0ec1c97c93c8c51f62b05b54cbaa8b3db2
SHA5129906e22f0f240be59e1c65d8259466fc4ffb229dbb45aae93740c9ba8e8fe752971971259ecbf95dcf864a4155c9c132f4a4e9caf71f101c33f45cdd4841f714