Analysis
-
max time kernel
1753s -
max time network
1963s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 05:42
Static task
static1
Behavioral task
behavioral1
Sample
22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe
Resource
win10v2004-20221111-en
General
-
Target
22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe
-
Size
700.4MB
-
MD5
96319a877bcdee0b4788a88b69b1f215
-
SHA1
6e1645c605965b20fab6775c0b676401cbbff00d
-
SHA256
22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55
-
SHA512
b2fcfe7a1a75b24323ba0ff96821c1561932f0c06136c4100b05eddfd667f9aecf6d488eed12c8cda52c2d9789d9120a24b7e16fc90b2c75d521563211c302c8
-
SSDEEP
6144:/EopXhSxHralFw1nXEjb5QM0Pq5Ml2QOyAm2c84fHNArD7V/2c84fH:2rkSnXEjupPa1QdAm2lgNCDx/2lg
Malware Config
Extracted
systembc
178.20.44.196:4127
192.168.1.149:4127
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\nvmcache\\raadmin.exe," reg.exe -
Executes dropped EXE 1 IoCs
Processes:
raadmin.exepid process 1860 raadmin.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 392 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
raadmin.exedescription pid process target process PID 1860 set thread context of 1608 1860 raadmin.exe jsc.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 536 PING.EXE 632 PING.EXE 2000 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exeraadmin.exepid process 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe 1860 raadmin.exe 1860 raadmin.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exeraadmin.exedescription pid process Token: SeDebugPrivilege 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe Token: SeDebugPrivilege 1860 raadmin.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.execmd.execmd.exeraadmin.exedescription pid process target process PID 652 wrote to memory of 1052 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe cmd.exe PID 652 wrote to memory of 1052 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe cmd.exe PID 652 wrote to memory of 1052 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe cmd.exe PID 652 wrote to memory of 1052 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe cmd.exe PID 1052 wrote to memory of 536 1052 cmd.exe PING.EXE PID 1052 wrote to memory of 536 1052 cmd.exe PING.EXE PID 1052 wrote to memory of 536 1052 cmd.exe PING.EXE PID 1052 wrote to memory of 536 1052 cmd.exe PING.EXE PID 652 wrote to memory of 392 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe cmd.exe PID 652 wrote to memory of 392 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe cmd.exe PID 652 wrote to memory of 392 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe cmd.exe PID 652 wrote to memory of 392 652 22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe cmd.exe PID 392 wrote to memory of 632 392 cmd.exe PING.EXE PID 392 wrote to memory of 632 392 cmd.exe PING.EXE PID 392 wrote to memory of 632 392 cmd.exe PING.EXE PID 392 wrote to memory of 632 392 cmd.exe PING.EXE PID 1052 wrote to memory of 844 1052 cmd.exe reg.exe PID 1052 wrote to memory of 844 1052 cmd.exe reg.exe PID 1052 wrote to memory of 844 1052 cmd.exe reg.exe PID 1052 wrote to memory of 844 1052 cmd.exe reg.exe PID 392 wrote to memory of 2000 392 cmd.exe PING.EXE PID 392 wrote to memory of 2000 392 cmd.exe PING.EXE PID 392 wrote to memory of 2000 392 cmd.exe PING.EXE PID 392 wrote to memory of 2000 392 cmd.exe PING.EXE PID 392 wrote to memory of 1860 392 cmd.exe raadmin.exe PID 392 wrote to memory of 1860 392 cmd.exe raadmin.exe PID 392 wrote to memory of 1860 392 cmd.exe raadmin.exe PID 392 wrote to memory of 1860 392 cmd.exe raadmin.exe PID 1860 wrote to memory of 1608 1860 raadmin.exe jsc.exe PID 1860 wrote to memory of 1608 1860 raadmin.exe jsc.exe PID 1860 wrote to memory of 1608 1860 raadmin.exe jsc.exe PID 1860 wrote to memory of 1608 1860 raadmin.exe jsc.exe PID 1860 wrote to memory of 1608 1860 raadmin.exe jsc.exe PID 1860 wrote to memory of 1608 1860 raadmin.exe jsc.exe PID 1860 wrote to memory of 1608 1860 raadmin.exe jsc.exe PID 1860 wrote to memory of 1608 1860 raadmin.exe jsc.exe PID 1860 wrote to memory of 1608 1860 raadmin.exe jsc.exe PID 1860 wrote to memory of 1608 1860 raadmin.exe jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe"C:\Users\Admin\AppData\Local\Temp\22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 57 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\nvmcache\raadmin.exe,"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 573⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\nvmcache\raadmin.exe,"3⤵
- Modifies WinLogon for persistence
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 69 > nul && copy "C:\Users\Admin\AppData\Local\Temp\22ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55.exe" "C:\Users\Admin\AppData\Roaming\nvmcache\raadmin.exe" && ping 127.0.0.1 -n 69 > nul && "C:\Users\Admin\AppData\Roaming\nvmcache\raadmin.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 693⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 693⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\nvmcache\raadmin.exe"C:\Users\Admin\AppData\Roaming\nvmcache\raadmin.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\nvmcache\raadmin.exeFilesize
700.4MB
MD596319a877bcdee0b4788a88b69b1f215
SHA16e1645c605965b20fab6775c0b676401cbbff00d
SHA25622ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55
SHA512b2fcfe7a1a75b24323ba0ff96821c1561932f0c06136c4100b05eddfd667f9aecf6d488eed12c8cda52c2d9789d9120a24b7e16fc90b2c75d521563211c302c8
-
C:\Users\Admin\AppData\Roaming\nvmcache\raadmin.exeFilesize
700.4MB
MD596319a877bcdee0b4788a88b69b1f215
SHA16e1645c605965b20fab6775c0b676401cbbff00d
SHA25622ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55
SHA512b2fcfe7a1a75b24323ba0ff96821c1561932f0c06136c4100b05eddfd667f9aecf6d488eed12c8cda52c2d9789d9120a24b7e16fc90b2c75d521563211c302c8
-
\Users\Admin\AppData\Roaming\nvmcache\raadmin.exeFilesize
700.4MB
MD596319a877bcdee0b4788a88b69b1f215
SHA16e1645c605965b20fab6775c0b676401cbbff00d
SHA25622ead9286bd771170d6b0dc050c67ff487e140918e9f0b529cde4d867dee9b55
SHA512b2fcfe7a1a75b24323ba0ff96821c1561932f0c06136c4100b05eddfd667f9aecf6d488eed12c8cda52c2d9789d9120a24b7e16fc90b2c75d521563211c302c8
-
memory/392-60-0x0000000000000000-mapping.dmp
-
memory/536-59-0x0000000000000000-mapping.dmp
-
memory/632-61-0x0000000000000000-mapping.dmp
-
memory/652-57-0x0000000000700000-0x0000000000718000-memory.dmpFilesize
96KB
-
memory/652-54-0x00000000009D0000-0x0000000000A54000-memory.dmpFilesize
528KB
-
memory/652-55-0x0000000074FD1000-0x0000000074FD3000-memory.dmpFilesize
8KB
-
memory/652-56-0x0000000000850000-0x0000000000880000-memory.dmpFilesize
192KB
-
memory/844-62-0x0000000000000000-mapping.dmp
-
memory/1052-58-0x0000000000000000-mapping.dmp
-
memory/1608-78-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1608-82-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1608-77-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1608-79-0x0000000000401000-mapping.dmp
-
memory/1608-76-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1608-72-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1608-73-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1608-75-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1860-68-0x00000000013E0000-0x0000000001464000-memory.dmpFilesize
528KB
-
memory/1860-71-0x0000000000E00000-0x0000000000E06000-memory.dmpFilesize
24KB
-
memory/1860-70-0x0000000000B60000-0x0000000000B7A000-memory.dmpFilesize
104KB
-
memory/1860-65-0x0000000000000000-mapping.dmp
-
memory/2000-63-0x0000000000000000-mapping.dmp