Analysis
-
max time kernel
142s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 10:53
Behavioral task
behavioral1
Sample
b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe
Resource
win10v2004-20221111-en
General
-
Target
b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe
-
Size
56KB
-
MD5
3f31fe3d757bf0b599ee08af4339ac43
-
SHA1
9c1c1e54f280006a5c47e9bd0f217e8007bdb484
-
SHA256
b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca
-
SHA512
ce2dd310ccdbb05ec1a8100e7c915fb55242a7026432c7cb181c804dedbf7d0ef0e65b7437f69eaa2cabf757e608eab458306310fb5f543f746901e4316e3c36
-
SSDEEP
768:EhNtJtqm0tJdWvHuHb2zrLZhunxSDgZjGjL8KDTY3mqQdTosytxnha5:Edqm4JdEHuHiXTnDgZSTkYdTosA
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000400000001e446-141.dat aspack_v212_v242 behavioral2/files/0x000400000001e446-140.dat aspack_v212_v242 behavioral2/files/0x000400000001e446-155.dat aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\j7argcb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\l6fqw.exe" b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts l6fqw.exe -
Executes dropped EXE 2 IoCs
pid Process 3032 l6fqw.exe 3216 l6fqw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" Rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ms4d.log l6fqw.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1912 sc.exe 4664 sc.exe 1420 sc.exe 4688 sc.exe 1196 sc.exe 1216 sc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 3032 l6fqw.exe 3032 l6fqw.exe 3032 l6fqw.exe 3216 l6fqw.exe 3216 l6fqw.exe 3216 l6fqw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4840 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 87 PID 4448 wrote to memory of 4840 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 87 PID 4448 wrote to memory of 4840 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 87 PID 4448 wrote to memory of 1912 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 88 PID 4448 wrote to memory of 1912 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 88 PID 4448 wrote to memory of 1912 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 88 PID 4448 wrote to memory of 1884 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 91 PID 4448 wrote to memory of 1884 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 91 PID 4448 wrote to memory of 1884 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 91 PID 4448 wrote to memory of 4664 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 92 PID 4448 wrote to memory of 4664 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 92 PID 4448 wrote to memory of 4664 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 92 PID 4448 wrote to memory of 3032 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 95 PID 4448 wrote to memory of 3032 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 95 PID 4448 wrote to memory of 3032 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 95 PID 1884 wrote to memory of 1572 1884 net.exe 96 PID 1884 wrote to memory of 1572 1884 net.exe 96 PID 1884 wrote to memory of 1572 1884 net.exe 96 PID 4840 wrote to memory of 2776 4840 net.exe 97 PID 4840 wrote to memory of 2776 4840 net.exe 97 PID 4840 wrote to memory of 2776 4840 net.exe 97 PID 4448 wrote to memory of 1040 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 98 PID 4448 wrote to memory of 1040 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 98 PID 4448 wrote to memory of 1040 4448 b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe 98 PID 1040 wrote to memory of 3708 1040 Rundll32.exe 99 PID 1040 wrote to memory of 3708 1040 Rundll32.exe 99 PID 1040 wrote to memory of 3708 1040 Rundll32.exe 99 PID 3032 wrote to memory of 920 3032 l6fqw.exe 100 PID 3032 wrote to memory of 920 3032 l6fqw.exe 100 PID 3032 wrote to memory of 920 3032 l6fqw.exe 100 PID 3032 wrote to memory of 1420 3032 l6fqw.exe 101 PID 3032 wrote to memory of 1420 3032 l6fqw.exe 101 PID 3032 wrote to memory of 1420 3032 l6fqw.exe 101 PID 3032 wrote to memory of 916 3032 l6fqw.exe 103 PID 3032 wrote to memory of 916 3032 l6fqw.exe 103 PID 3032 wrote to memory of 916 3032 l6fqw.exe 103 PID 3032 wrote to memory of 4688 3032 l6fqw.exe 108 PID 3032 wrote to memory of 4688 3032 l6fqw.exe 108 PID 3032 wrote to memory of 4688 3032 l6fqw.exe 108 PID 3032 wrote to memory of 3216 3032 l6fqw.exe 107 PID 3032 wrote to memory of 3216 3032 l6fqw.exe 107 PID 3032 wrote to memory of 3216 3032 l6fqw.exe 107 PID 920 wrote to memory of 1748 920 net.exe 109 PID 920 wrote to memory of 1748 920 net.exe 109 PID 920 wrote to memory of 1748 920 net.exe 109 PID 916 wrote to memory of 4256 916 net.exe 110 PID 916 wrote to memory of 4256 916 net.exe 110 PID 916 wrote to memory of 4256 916 net.exe 110 PID 3216 wrote to memory of 2504 3216 l6fqw.exe 111 PID 3216 wrote to memory of 2504 3216 l6fqw.exe 111 PID 3216 wrote to memory of 2504 3216 l6fqw.exe 111 PID 3216 wrote to memory of 1216 3216 l6fqw.exe 118 PID 3216 wrote to memory of 1216 3216 l6fqw.exe 118 PID 3216 wrote to memory of 1216 3216 l6fqw.exe 118 PID 3216 wrote to memory of 5088 3216 l6fqw.exe 113 PID 3216 wrote to memory of 5088 3216 l6fqw.exe 113 PID 3216 wrote to memory of 5088 3216 l6fqw.exe 113 PID 3216 wrote to memory of 1196 3216 l6fqw.exe 114 PID 3216 wrote to memory of 1196 3216 l6fqw.exe 114 PID 3216 wrote to memory of 1196 3216 l6fqw.exe 114 PID 2504 wrote to memory of 4512 2504 net.exe 119 PID 2504 wrote to memory of 4512 2504 net.exe 119 PID 2504 wrote to memory of 4512 2504 net.exe 119 PID 5088 wrote to memory of 3372 5088 net.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe"C:\Users\Admin\AppData\Local\Temp\b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca.exe"1⤵
- Adds policy Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵PID:2776
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
PID:1912
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵PID:1572
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\l6fqw.exeC:\Users\Admin\AppData\Local\Temp\l6fqw.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"3⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵PID:1748
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED3⤵
- Launches sc.exe
PID:1420
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵PID:4256
-
-
-
C:\Users\Admin\AppData\Local\Temp\l6fqw.exeC:\Users\Admin\AppData\Local\Temp\l6fqw.exe -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⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"4⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵PID:4512
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"5⤵PID:3372
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED4⤵
- Launches sc.exe
PID:1196
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED4⤵
- Launches sc.exe
PID:1216
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED3⤵
- Launches sc.exe
PID:4688
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Local\Temp\mdinstall.inf2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r3⤵
- Checks processor information in registry
PID:3708 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o4⤵PID:2216
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\meslfpwk.bat2⤵PID:1144
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD53f31fe3d757bf0b599ee08af4339ac43
SHA19c1c1e54f280006a5c47e9bd0f217e8007bdb484
SHA256b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca
SHA512ce2dd310ccdbb05ec1a8100e7c915fb55242a7026432c7cb181c804dedbf7d0ef0e65b7437f69eaa2cabf757e608eab458306310fb5f543f746901e4316e3c36
-
Filesize
56KB
MD53f31fe3d757bf0b599ee08af4339ac43
SHA19c1c1e54f280006a5c47e9bd0f217e8007bdb484
SHA256b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca
SHA512ce2dd310ccdbb05ec1a8100e7c915fb55242a7026432c7cb181c804dedbf7d0ef0e65b7437f69eaa2cabf757e608eab458306310fb5f543f746901e4316e3c36
-
Filesize
56KB
MD53f31fe3d757bf0b599ee08af4339ac43
SHA19c1c1e54f280006a5c47e9bd0f217e8007bdb484
SHA256b4db59d40c2b586c0908be76e8d1db8a998afee13148184f11fa95f9fb9f54ca
SHA512ce2dd310ccdbb05ec1a8100e7c915fb55242a7026432c7cb181c804dedbf7d0ef0e65b7437f69eaa2cabf757e608eab458306310fb5f543f746901e4316e3c36
-
Filesize
413B
MD5ce1f2d7c8e36f3c085a5d281b9ebeb2f
SHA1bbbfae948d625afe50f66f34282bda3974cfdce5
SHA256312239a5c6333e6d1e8ba9f0e81856c37347be0f21d194741ae1d25538cd130c
SHA51289f69b88bdfb391f58abaefbbae7e393571709c0ea6a268794c035200674ad3a8615a65944373559aead87e8d5ab09f334e2b1563c1bde912aa26a485b76357e
-
Filesize
254B
MD5e7af7b1d4e2452b5fb4cabe22afeac27
SHA123e9f51a40c617cfddb52838b1ecfdb059961d6b
SHA2560b0f2ce60566d5ffb1a9b8734e2924caa05554c9af11aaec3d6969cb4f54d390
SHA512889194472bf7e14630d6da8052a260df59d8720946249a94a57c11de97b9f1bcee1e9175ce7b8bc9210810916bb832be3a1f28b0c73753120b73335005ece054