Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2023 19:33

General

  • Target

    process.exe

  • Size

    258KB

  • MD5

    4b845f07de6d5d8ad72a57d9169f69be

  • SHA1

    cfec4bce14ce9c85350f8f943c1ab8068be9e42b

  • SHA256

    0dd112b4f23ce4ad0d6619dc2686b58f686ad47509c4e9a66b045a7385ebda64

  • SHA512

    b15b8b57ea5bdbbb4f1fda0036560d1f0ee89d0122dac92ddd816897312fd5d6c0219e7898d85a88649283790887ef74fa5b317cdf1cb6452fb9484f441854fe

  • SSDEEP

    6144:4I4vO0B+oVTIn0UAaH0neolFc6hoPnJEdRcgY5STm:yvpBRBInQ7bc6hMJEdRcgY

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\process.exe
    "C:\Users\Admin\AppData\Local\Temp\process.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c sc start stisvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Windows\SysWOW64\sc.exe
        sc start stisvc
        3⤵
        • Launches sc.exe
        PID:4312
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop wuauserv
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Windows\SysWOW64\sc.exe
        sc stop wuauserv
        3⤵
        • Launches sc.exe
        PID:4328
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c sc start wuauserv
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:644
      • C:\Windows\SysWOW64\sc.exe
        sc start wuauserv
        3⤵
        • Launches sc.exe
        PID:3388
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
      PID:4432

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IEHelper.dll

      Filesize

      154KB

      MD5

      00b5bc89db9eb0a2bf915c834e2c31f5

      SHA1

      50367913472880e8b533750027de37d727cb5043

      SHA256

      90523dfb329e6e732e5e7032bf316c806e8ff303f531a10461a1ab14639933e0

      SHA512

      7ec041d61c581388a50f853a909e30bebdc6fdd8e39d2c5c9d9af1af4f707d480ae5f1a6eddea595d6538e5a25b0b55a6a9b7a3f3aba862c3702d496e3ae712c