Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 13:34
Static task
static1
Behavioral task
behavioral1
Sample
7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe
Resource
win10v2004-20221111-en
General
-
Target
7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe
-
Size
1.6MB
-
MD5
f35b9877a19542a4aa4f6e4a146b9dc3
-
SHA1
a73990fc6ba90f359d9bf5c2bbfe50637256e58d
-
SHA256
7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5
-
SHA512
669e6a7e9c44120b6be2e1c36d72f2da7f888180eb374d12ad7565c0fb24a854c310cede21b2b96c496c94dd7cd8fe506ca694c20b7c394d7e04440df4bafba8
-
SSDEEP
49152:wfkjGIBKkTMGqp7cTdFgRHzYYNgb7R3AEWzR:wfoTTM5sYNgpQEWR
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe -
Executes dropped EXE 2 IoCs
pid Process 1952 tp.exe 1924 WinHlkk32.exe -
Loads dropped DLL 4 IoCs
pid Process 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1952 tp.exe 1952 tp.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHlkk32.exe tp.exe File opened for modification C:\Windows\SysWOW64\WinHlkk32.exe tp.exe File created C:\Windows\SysWOW64\WinHlkk32.exe WinHlkk32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
pid Process 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1952 tp.exe Token: SeIncBasePriorityPrivilege 1924 WinHlkk32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1952 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 28 PID 1776 wrote to memory of 1952 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 28 PID 1776 wrote to memory of 1952 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 28 PID 1776 wrote to memory of 1952 1776 7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe 28 PID 1952 wrote to memory of 1924 1952 tp.exe 29 PID 1952 wrote to memory of 1924 1952 tp.exe 29 PID 1952 wrote to memory of 1924 1952 tp.exe 29 PID 1952 wrote to memory of 1924 1952 tp.exe 29 PID 1952 wrote to memory of 1076 1952 tp.exe 30 PID 1952 wrote to memory of 1076 1952 tp.exe 30 PID 1952 wrote to memory of 1076 1952 tp.exe 30 PID 1952 wrote to memory of 1076 1952 tp.exe 30 PID 1924 wrote to memory of 1832 1924 WinHlkk32.exe 31 PID 1924 wrote to memory of 1832 1924 WinHlkk32.exe 31 PID 1924 wrote to memory of 1832 1924 WinHlkk32.exe 31 PID 1924 wrote to memory of 1832 1924 WinHlkk32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe"C:\Users\Admin\AppData\Local\Temp\7cd9cb76ba65668c1eed5808a93deebd56fbb129f915f81490dd59073ca6d2b5.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\tp.exeC:\Users\Admin\AppData\Local\Temp\\tp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\WinHlkk32.exe"C:\Windows\system32\WinHlkk32.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\WINHLK~1.EXE > nul4⤵PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\tp.exe > nul3⤵PID:1076
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5b7669463a17ffe8d82cba0ad91ec508e
SHA19bc48dc43d93e3e74231e03e927421e6a299433b
SHA2561a9b438c8da84e6883f4b5cbf5d7d45330c8dc24d3999d4a9f8bdad963dc5294
SHA512f15cb7b069b92ee143674bd5f7893228b1a09bdb46ab4d59427d812e77e277d24cb7b47243b3345cf7ffd11719c312309dd478897975f38f5abbfe43a44ad09f
-
Filesize
20KB
MD5b7669463a17ffe8d82cba0ad91ec508e
SHA19bc48dc43d93e3e74231e03e927421e6a299433b
SHA2561a9b438c8da84e6883f4b5cbf5d7d45330c8dc24d3999d4a9f8bdad963dc5294
SHA512f15cb7b069b92ee143674bd5f7893228b1a09bdb46ab4d59427d812e77e277d24cb7b47243b3345cf7ffd11719c312309dd478897975f38f5abbfe43a44ad09f
-
Filesize
20KB
MD5b7669463a17ffe8d82cba0ad91ec508e
SHA19bc48dc43d93e3e74231e03e927421e6a299433b
SHA2561a9b438c8da84e6883f4b5cbf5d7d45330c8dc24d3999d4a9f8bdad963dc5294
SHA512f15cb7b069b92ee143674bd5f7893228b1a09bdb46ab4d59427d812e77e277d24cb7b47243b3345cf7ffd11719c312309dd478897975f38f5abbfe43a44ad09f
-
Filesize
20KB
MD5b7669463a17ffe8d82cba0ad91ec508e
SHA19bc48dc43d93e3e74231e03e927421e6a299433b
SHA2561a9b438c8da84e6883f4b5cbf5d7d45330c8dc24d3999d4a9f8bdad963dc5294
SHA512f15cb7b069b92ee143674bd5f7893228b1a09bdb46ab4d59427d812e77e277d24cb7b47243b3345cf7ffd11719c312309dd478897975f38f5abbfe43a44ad09f
-
Filesize
20KB
MD5b7669463a17ffe8d82cba0ad91ec508e
SHA19bc48dc43d93e3e74231e03e927421e6a299433b
SHA2561a9b438c8da84e6883f4b5cbf5d7d45330c8dc24d3999d4a9f8bdad963dc5294
SHA512f15cb7b069b92ee143674bd5f7893228b1a09bdb46ab4d59427d812e77e277d24cb7b47243b3345cf7ffd11719c312309dd478897975f38f5abbfe43a44ad09f
-
Filesize
20KB
MD5b7669463a17ffe8d82cba0ad91ec508e
SHA19bc48dc43d93e3e74231e03e927421e6a299433b
SHA2561a9b438c8da84e6883f4b5cbf5d7d45330c8dc24d3999d4a9f8bdad963dc5294
SHA512f15cb7b069b92ee143674bd5f7893228b1a09bdb46ab4d59427d812e77e277d24cb7b47243b3345cf7ffd11719c312309dd478897975f38f5abbfe43a44ad09f
-
Filesize
20KB
MD5b7669463a17ffe8d82cba0ad91ec508e
SHA19bc48dc43d93e3e74231e03e927421e6a299433b
SHA2561a9b438c8da84e6883f4b5cbf5d7d45330c8dc24d3999d4a9f8bdad963dc5294
SHA512f15cb7b069b92ee143674bd5f7893228b1a09bdb46ab4d59427d812e77e277d24cb7b47243b3345cf7ffd11719c312309dd478897975f38f5abbfe43a44ad09f
-
Filesize
20KB
MD5b7669463a17ffe8d82cba0ad91ec508e
SHA19bc48dc43d93e3e74231e03e927421e6a299433b
SHA2561a9b438c8da84e6883f4b5cbf5d7d45330c8dc24d3999d4a9f8bdad963dc5294
SHA512f15cb7b069b92ee143674bd5f7893228b1a09bdb46ab4d59427d812e77e277d24cb7b47243b3345cf7ffd11719c312309dd478897975f38f5abbfe43a44ad09f