Resubmissions
19-04-2023 01:43
230419-b5gtaafe75 10Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2023 01:43
Static task
static1
Behavioral task
behavioral1
Sample
ClasSvc.exe
Resource
win7-20230220-en
windows7-x64
6 signatures
150 seconds
General
-
Target
ClasSvc.exe
-
Size
17.1MB
-
MD5
305e71ec353a718b055ea9acaa6598a3
-
SHA1
3d26bb3b0a669b98c5226bcdd3473440e47162d5
-
SHA256
031f9345c33543366e9c66447f4f3fb085a2e04f3c2f98f562f191de6a413dd0
-
SHA512
2f9c163ac5e2980825b536b384329714dc602079e4bd0b9e2654df40fcd659e67e4e2a17b338a81fc8ac39e0ff1ae83b625e102f9308a0734948412c4a4dc2eb
-
SSDEEP
196608:uNjzJSeEtAVBt4/BixizJcPM5OzQ6UM6pZpKerXvob24hwhxbQLJC:uNjzJSeE0D4KiZ5OyM6pXTrXvMwrbQLM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation ClasSvc.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\1 ClasSvc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString ClasSvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\2 ClasSvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\0 ClasSvc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ClasSvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\16 ClasSvc.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4464 ClasSvc.exe 4464 ClasSvc.exe 4464 ClasSvc.exe 4464 ClasSvc.exe 4464 ClasSvc.exe 4464 ClasSvc.exe 4464 ClasSvc.exe 4464 ClasSvc.exe 4464 ClasSvc.exe 4464 ClasSvc.exe 644 ClasSvc.exe 644 ClasSvc.exe 644 ClasSvc.exe 644 ClasSvc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4464 ClasSvc.exe Token: SeDebugPrivilege 4464 ClasSvc.exe Token: SeTakeOwnershipPrivilege 644 ClasSvc.exe Token: SeTcbPrivilege 644 ClasSvc.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4464 ClasSvc.exe 4464 ClasSvc.exe 4464 ClasSvc.exe 4464 ClasSvc.exe 644 ClasSvc.exe 644 ClasSvc.exe 644 ClasSvc.exe 644 ClasSvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ClasSvc.exe"C:\Users\Admin\AppData\Local\Temp\ClasSvc.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\ClasSvc.exeC:\Users\Admin\AppData\Local\Temp\ClasSvc.exe -run_agent -second2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:644
-