Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04/03/2023, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5.exe
Resource
win10-20230220-en
General
-
Target
77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5.exe
-
Size
4.2MB
-
MD5
1c9a222163b26914af30d525a7536b7a
-
SHA1
fec34937edb4b9fe8357b7650f33a7f0e509b6d7
-
SHA256
77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5
-
SHA512
f74b53d35dde56d9ee69b3fafac112064d1e6f418ef53d26b6ec8e915bebaf5dcebd07c50adec0b149eef19c7937d7042ea5743d53ce7604de9f0c5b90447646
-
SSDEEP
49152:Mkx28PbFFbDmcVY9yIsI/qaQjI6DpiRp5ZtCaMRka7eQxh+KDQy8YTc7cN6oe4Co:MhutKcm9yB4iIEiB2+a7eUkuL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4036 regid.1991-06.com.microsoftMicrosoft-type6.2.6.5.exe 4460 regid.1991-06.com.microsoftMicrosoft-type6.2.6.5.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2712 icacls.exe 4960 icacls.exe 2628 icacls.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1676 set thread context of 2104 1676 77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5.exe 67 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 448 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2104 1676 77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5.exe 67 PID 1676 wrote to memory of 2104 1676 77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5.exe 67 PID 1676 wrote to memory of 2104 1676 77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5.exe 67 PID 1676 wrote to memory of 2104 1676 77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5.exe 67 PID 1676 wrote to memory of 2104 1676 77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5.exe 67 PID 2104 wrote to memory of 2628 2104 MSBuild.exe 68 PID 2104 wrote to memory of 2628 2104 MSBuild.exe 68 PID 2104 wrote to memory of 2628 2104 MSBuild.exe 68 PID 2104 wrote to memory of 2712 2104 MSBuild.exe 70 PID 2104 wrote to memory of 2712 2104 MSBuild.exe 70 PID 2104 wrote to memory of 2712 2104 MSBuild.exe 70 PID 2104 wrote to memory of 4960 2104 MSBuild.exe 72 PID 2104 wrote to memory of 4960 2104 MSBuild.exe 72 PID 2104 wrote to memory of 4960 2104 MSBuild.exe 72 PID 2104 wrote to memory of 448 2104 MSBuild.exe 74 PID 2104 wrote to memory of 448 2104 MSBuild.exe 74 PID 2104 wrote to memory of 448 2104 MSBuild.exe 74 PID 2104 wrote to memory of 4036 2104 MSBuild.exe 76 PID 2104 wrote to memory of 4036 2104 MSBuild.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5.exe"C:\Users\Admin\AppData\Local\Temp\77efd96a15826d009434a2942f9a26a60d6b04688c249d5ef08d0cf126a9c0f5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2628
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2712
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4960
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "regid.1991-06.com.microsoftMicrosoft-type6.2.6.5\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5" /TR "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:448
-
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5.exe"C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Executes dropped EXE
PID:4036
-
-
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5.exeC:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5.exe1⤵
- Executes dropped EXE
PID:4460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5.exe
Filesize809.1MB
MD53ea7920b77c7697795bb81dc626816a6
SHA184a11fbb8623b9fd92426d4c91fa92d649fbee85
SHA256f467304dadafc318dee5b2a52ddfad40d63f7efc31af5ce9260ad96230e93733
SHA5121c9a9bc8a49f463daad61607973dd0e9714dd4b6b512883e7580d6c7094af7e39a0f9cfc27bfcc8eecf4831d4dc76e87420fa5321d6b98267cdaef941ba0f874
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5.exe
Filesize830.2MB
MD5b7ab72eb7f2d5df4c8f52df142832f20
SHA1f2e52c52113c1762cab5a2eb9142278a1247f335
SHA2567c2783a534666b3d9fbec9aad5c884d8445ae201845b8723d6c9b5319beba7df
SHA512fb46acff4d19f9c7b1250037833d26b077581a3ab4fd265763842d1f76cd3597657999c5ae5f654f5ee0eeb636b954c9acc5c86309cec867ef4e217462bf202b
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5\regid.1991-06.com.microsoftMicrosoft-type6.2.6.5.exe
Filesize251.9MB
MD53b063b0421b1931a868462f2b8f1a26b
SHA162d1c3388bf7e2ecb9bd77e9ee0e91e5ab1210d6
SHA256bb323811fd9303773fa5984627b3d37959a3bbd735ce85ad4dbb8c168719abab
SHA51259c129ee7fc966d88399dbb1ea45ade966535d9a2f4ef4ec023ef8f866fe660f361dc28c199393724a3633d58dcb027bacba745a0468aa5b4afda9e70c64a018