Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-06-2023 13:01
Static task
static1
Behavioral task
behavioral1
Sample
6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe
Resource
win10v2004-20230220-en
General
-
Target
6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe
-
Size
8.1MB
-
MD5
ef194a3933b45e376e35ba7c4b14bf49
-
SHA1
0830bceebac97ee4ecf909e22189c858865a553f
-
SHA256
6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d
-
SHA512
c0777e7ea276d983a72cdc6286b22e8267b1f2fe7baf3aaf47e63400bca1ba2ce88d2a59fe1d8bce001c3accdcfcd04f5e4552c3a659206d9e1493c45a71d3fd
-
SSDEEP
98304:voRRzohHPzOY8MqNY5rONLPW75h1Zfvcls5+wMLi7VjtY2xhSzmUOlWg7t:vCRctM0yNDWL1FvclsGWhD9UOJp
Malware Config
Extracted
bitrat
1.38
rxbwrzmdaw27pt7lrrhophwwlcyuqkw3n2dhpr5gu5bjh3ut2ot2mwid.onion:80
-
communication_password
5ffc3746012bb1139c6bf49107694c1a
-
tor_process
Smartscreens
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 464 svchost.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 564 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe -
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 464 set thread context of 1092 464 svchost.exe SetupUtility.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1816 1092 WerFault.exe SetupUtility.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 560 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exepowershell.exesvchost.exepid process 1220 6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe 1100 powershell.exe 464 svchost.exe 464 svchost.exe 464 svchost.exe 464 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
svchost.exepid process 464 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exesvchost.exepowershell.exedescription pid process Token: SeDebugPrivilege 1220 6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe Token: SeDebugPrivilege 464 svchost.exe Token: SeDebugPrivilege 464 svchost.exe Token: SeLoadDriverPrivilege 464 svchost.exe Token: SeDebugPrivilege 1100 powershell.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.execmd.execmd.exesvchost.exeSetupUtility.exedescription pid process target process PID 1220 wrote to memory of 2020 1220 6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe cmd.exe PID 1220 wrote to memory of 2020 1220 6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe cmd.exe PID 1220 wrote to memory of 2020 1220 6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe cmd.exe PID 1220 wrote to memory of 564 1220 6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe cmd.exe PID 1220 wrote to memory of 564 1220 6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe cmd.exe PID 1220 wrote to memory of 564 1220 6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe cmd.exe PID 564 wrote to memory of 560 564 cmd.exe timeout.exe PID 564 wrote to memory of 560 564 cmd.exe timeout.exe PID 564 wrote to memory of 560 564 cmd.exe timeout.exe PID 2020 wrote to memory of 568 2020 cmd.exe schtasks.exe PID 2020 wrote to memory of 568 2020 cmd.exe schtasks.exe PID 2020 wrote to memory of 568 2020 cmd.exe schtasks.exe PID 564 wrote to memory of 464 564 cmd.exe svchost.exe PID 564 wrote to memory of 464 564 cmd.exe svchost.exe PID 564 wrote to memory of 464 564 cmd.exe svchost.exe PID 464 wrote to memory of 1100 464 svchost.exe powershell.exe PID 464 wrote to memory of 1100 464 svchost.exe powershell.exe PID 464 wrote to memory of 1100 464 svchost.exe powershell.exe PID 464 wrote to memory of 1652 464 svchost.exe DataSvcUtil.exe PID 464 wrote to memory of 1652 464 svchost.exe DataSvcUtil.exe PID 464 wrote to memory of 1652 464 svchost.exe DataSvcUtil.exe PID 464 wrote to memory of 1084 464 svchost.exe aspnet_regbrowsers.exe PID 464 wrote to memory of 1084 464 svchost.exe aspnet_regbrowsers.exe PID 464 wrote to memory of 1084 464 svchost.exe aspnet_regbrowsers.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 464 wrote to memory of 1092 464 svchost.exe SetupUtility.exe PID 1092 wrote to memory of 1816 1092 SetupUtility.exe WerFault.exe PID 1092 wrote to memory of 1816 1092 SetupUtility.exe WerFault.exe PID 1092 wrote to memory of 1816 1092 SetupUtility.exe WerFault.exe PID 1092 wrote to memory of 1816 1092 SetupUtility.exe WerFault.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe"C:\Users\Admin\AppData\Local\Temp\6139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1259.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Sets service image path in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 1685⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp1259.tmp.batFilesize
151B
MD5e894c0e5ebcd2efa4a735828bc91ad2e
SHA1a7c49843c2f45bceb0d8d5d947943485c9c4c91a
SHA256269929c768b80345ee1aad2f9f3596b0960904b9637014b089800171c5c96012
SHA5123844d7063134bd97c142ef71a2dde15b31a2e8ea02d1d7eeb0fdc3435c77ee081d2f4704fa478ef995d1cd97bf23618bf10168848f6956641524a70796363a33
-
C:\Users\Admin\AppData\Local\Temp\tmp1259.tmp.batFilesize
151B
MD5e894c0e5ebcd2efa4a735828bc91ad2e
SHA1a7c49843c2f45bceb0d8d5d947943485c9c4c91a
SHA256269929c768b80345ee1aad2f9f3596b0960904b9637014b089800171c5c96012
SHA5123844d7063134bd97c142ef71a2dde15b31a2e8ea02d1d7eeb0fdc3435c77ee081d2f4704fa478ef995d1cd97bf23618bf10168848f6956641524a70796363a33
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
8.1MB
MD5ef194a3933b45e376e35ba7c4b14bf49
SHA10830bceebac97ee4ecf909e22189c858865a553f
SHA2566139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d
SHA512c0777e7ea276d983a72cdc6286b22e8267b1f2fe7baf3aaf47e63400bca1ba2ce88d2a59fe1d8bce001c3accdcfcd04f5e4552c3a659206d9e1493c45a71d3fd
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
8.1MB
MD5ef194a3933b45e376e35ba7c4b14bf49
SHA10830bceebac97ee4ecf909e22189c858865a553f
SHA2566139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d
SHA512c0777e7ea276d983a72cdc6286b22e8267b1f2fe7baf3aaf47e63400bca1ba2ce88d2a59fe1d8bce001c3accdcfcd04f5e4552c3a659206d9e1493c45a71d3fd
-
\Users\Admin\AppData\Roaming\svchost.exeFilesize
8.1MB
MD5ef194a3933b45e376e35ba7c4b14bf49
SHA10830bceebac97ee4ecf909e22189c858865a553f
SHA2566139bf20b47414826d17354ffd408c3a6182ed05d2688bafe45a8f9d4c18133d
SHA512c0777e7ea276d983a72cdc6286b22e8267b1f2fe7baf3aaf47e63400bca1ba2ce88d2a59fe1d8bce001c3accdcfcd04f5e4552c3a659206d9e1493c45a71d3fd
-
memory/464-68-0x0000000000A30000-0x0000000001242000-memory.dmpFilesize
8.1MB
-
memory/464-69-0x000000001C540000-0x000000001C5C0000-memory.dmpFilesize
512KB
-
memory/1092-80-0x0000000000400000-0x0000000000BD8000-memory.dmpFilesize
7.8MB
-
memory/1100-75-0x000000001B2E0000-0x000000001B5C2000-memory.dmpFilesize
2.9MB
-
memory/1100-76-0x0000000002070000-0x0000000002078000-memory.dmpFilesize
32KB
-
memory/1100-77-0x0000000002A00000-0x0000000002A80000-memory.dmpFilesize
512KB
-
memory/1100-79-0x0000000002A00000-0x0000000002A80000-memory.dmpFilesize
512KB
-
memory/1100-78-0x0000000002A00000-0x0000000002A80000-memory.dmpFilesize
512KB
-
memory/1100-81-0x0000000002A0B000-0x0000000002A42000-memory.dmpFilesize
220KB
-
memory/1220-54-0x0000000000F90000-0x00000000017A2000-memory.dmpFilesize
8.1MB