Analysis
-
max time kernel
164s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 09:29
Static task
static1
Behavioral task
behavioral1
Sample
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe
Resource
win10v2004-20220901-en
General
-
Target
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe
-
Size
220KB
-
MD5
9ed5fddac20417cc7d033586089557e2
-
SHA1
7d5cff8e55ddb958558c3c798f177f023d31ba1f
-
SHA256
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39
-
SHA512
ebb0ffa7ea551c6928701219c9353f78588b8f8c9ccbabb14e173bc1a408991c4233f81f9822dcc3b3613effe97628fa3bbd73a8ec8332eaf231e62cc85ebad2
-
SSDEEP
6144:BE5Sj6t+tEA0LEIm5V6ZrRN+hBcT4dng/G:C5SjzEPtGV6ZjZkdnSG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
csrss.exepid process 332 csrss.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1560 cmd.exe -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 94.242.250.64 Destination IP 94.242.250.64 Destination IP 94.242.250.64 Destination IP 94.242.250.64 -
Drops desktop.ini file(s) 2 IoCs
Processes:
csrss.exedescription ioc process File created \systemroot\assembly\GAC_64\Desktop.ini csrss.exe File created \systemroot\assembly\GAC_32\Desktop.ini csrss.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exedescription pid process target process PID 1232 set thread context of 1560 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.execsrss.exepid process 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe 332 csrss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1284 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe Token: SeDebugPrivilege 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe Token: SeShutdownPrivilege 1284 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
csrss.exepid process 332 csrss.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.execsrss.exedescription pid process target process PID 1232 wrote to memory of 1284 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe Explorer.EXE PID 1232 wrote to memory of 332 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe csrss.exe PID 1232 wrote to memory of 1560 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe cmd.exe PID 1232 wrote to memory of 1560 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe cmd.exe PID 1232 wrote to memory of 1560 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe cmd.exe PID 1232 wrote to memory of 1560 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe cmd.exe PID 1232 wrote to memory of 1560 1232 e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe cmd.exe PID 332 wrote to memory of 860 332 csrss.exe svchost.exe
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe"C:\Users\Admin\AppData\Local\Temp\e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Deletes itself
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system32\consrv.dllFilesize
52KB
MD56bf2039986af96d98e08824ac6c383fd
SHA10bb6384656a96943cb427baa92446f987219a02e
SHA256a3e03454ff636f4cdd0a95b856ea9e7857cd3ce0fd2bc6d528ab45781349103f
SHA512fae378badcd6b45d69705d11fe5feb2d9f93fa444249c13aff9b150359ffdbcfe2b160731e193d3e19b6eef18d2ef01de41549a1c2bbdf59501f901511f9068e
-
\??\globalroot\systemroot\assembly\temp\@Filesize
2KB
MD56ce4c6e6850a2ea6915da255a8ca4dce
SHA194f6a93f74f26d576e5089cc58143dab01287062
SHA2569dc327d2feb7a28badc95b8c0c5c78cd20ac60ab084f93781104a433819642b9
SHA51253d0fc1e0da5a90ca8fe7aabc4ce974953fb144ae8c9f706b94d36d41e500effb5ca21842de565e21459990b47a93b88abe21eb0be4edcfdbadfa27cf8fce51d
-
\Windows\System32\consrv.dllFilesize
52KB
MD56bf2039986af96d98e08824ac6c383fd
SHA10bb6384656a96943cb427baa92446f987219a02e
SHA256a3e03454ff636f4cdd0a95b856ea9e7857cd3ce0fd2bc6d528ab45781349103f
SHA512fae378badcd6b45d69705d11fe5feb2d9f93fa444249c13aff9b150359ffdbcfe2b160731e193d3e19b6eef18d2ef01de41549a1c2bbdf59501f901511f9068e
-
memory/332-72-0x0000000000A40000-0x0000000000A51000-memory.dmpFilesize
68KB
-
memory/860-79-0x00000000007F0000-0x00000000007FB000-memory.dmpFilesize
44KB
-
memory/860-75-0x00000000007F0000-0x00000000007FB000-memory.dmpFilesize
44KB
-
memory/860-88-0x0000000000800000-0x000000000080B000-memory.dmpFilesize
44KB
-
memory/860-87-0x00000000007E0000-0x00000000007E8000-memory.dmpFilesize
32KB
-
memory/860-86-0x0000000000800000-0x000000000080B000-memory.dmpFilesize
44KB
-
memory/860-85-0x00000000007E0000-0x00000000007E8000-memory.dmpFilesize
32KB
-
memory/860-83-0x00000000007F0000-0x00000000007FB000-memory.dmpFilesize
44KB
-
memory/1232-69-0x0000000000280000-0x00000000002BA000-memory.dmpFilesize
232KB
-
memory/1232-56-0x0000000000280000-0x00000000002BA000-memory.dmpFilesize
232KB
-
memory/1232-74-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1232-54-0x0000000074FA1000-0x0000000074FA3000-memory.dmpFilesize
8KB
-
memory/1232-55-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1232-66-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1284-61-0x0000000002A10000-0x0000000002A16000-memory.dmpFilesize
24KB
-
memory/1284-57-0x0000000002A10000-0x0000000002A16000-memory.dmpFilesize
24KB
-
memory/1284-65-0x0000000002A10000-0x0000000002A16000-memory.dmpFilesize
24KB
-
memory/1284-68-0x000007FF66ED0000-0x000007FF66EDA000-memory.dmpFilesize
40KB
-
memory/1284-67-0x000007FEF60C0000-0x000007FEF6203000-memory.dmpFilesize
1.3MB
-
memory/1560-73-0x0000000000000000-mapping.dmp