Analysis
-
max time kernel
109s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
29-06-2023 00:19
Behavioral task
behavioral1
Sample
Servexxxr.exe
Resource
win7-20230621-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Servexxxr.exe
Resource
win10v2004-20230621-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
Servexxxr.exe
-
Size
93KB
-
MD5
bac3e3a27867ed4fec83edffd7cdf851
-
SHA1
ee1339a375d50b0aa1459543f2aacaab5c810c9c
-
SHA256
a2c863ccc540a385073d3b08ab8fb1ec6c1d23b599b57a13a604002cba27f2a4
-
SHA512
09ca8b12914d0da03797f8b34c7cd5f6ea42e94919d0c40270b88a110ee285372ad910b506311662a77620426a03dbf8cc8daccb6e9c4ddf6ece060f428b4721
-
SSDEEP
1536:1U33wHyNxrBhh5YLg1jEwzGi1dDbDEgS:1UKyNxrBhLggCi1dj9
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1684 cmd.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 968 regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Servexxxr.exepid process 1732 Servexxxr.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
Servexxxr.exedescription pid process Token: SeDebugPrivilege 1732 Servexxxr.exe Token: 33 1732 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1732 Servexxxr.exe Token: 33 1732 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1732 Servexxxr.exe Token: 33 1732 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1732 Servexxxr.exe Token: 33 1732 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1732 Servexxxr.exe Token: 33 1732 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1732 Servexxxr.exe Token: 33 1732 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1732 Servexxxr.exe Token: 33 1732 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1732 Servexxxr.exe Token: 33 1732 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1732 Servexxxr.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Servexxxr.execmd.exedescription pid process target process PID 1732 wrote to memory of 876 1732 Servexxxr.exe netsh.exe PID 1732 wrote to memory of 876 1732 Servexxxr.exe netsh.exe PID 1732 wrote to memory of 876 1732 Servexxxr.exe netsh.exe PID 1732 wrote to memory of 876 1732 Servexxxr.exe netsh.exe PID 1732 wrote to memory of 1412 1732 Servexxxr.exe netsh.exe PID 1732 wrote to memory of 1412 1732 Servexxxr.exe netsh.exe PID 1732 wrote to memory of 1412 1732 Servexxxr.exe netsh.exe PID 1732 wrote to memory of 1412 1732 Servexxxr.exe netsh.exe PID 1732 wrote to memory of 1684 1732 Servexxxr.exe cmd.exe PID 1732 wrote to memory of 1684 1732 Servexxxr.exe cmd.exe PID 1732 wrote to memory of 1684 1732 Servexxxr.exe cmd.exe PID 1732 wrote to memory of 1684 1732 Servexxxr.exe cmd.exe PID 1684 wrote to memory of 1656 1684 cmd.exe PING.EXE PID 1684 wrote to memory of 1656 1684 cmd.exe PING.EXE PID 1684 wrote to memory of 1656 1684 cmd.exe PING.EXE PID 1684 wrote to memory of 1656 1684 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe" "Servexxxr.exe" ENABLE2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 0 -n 23⤵
- Runs ping.exe
-
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\Desktop\WriteRestart.reg"1⤵
- Runs .reg file with regedit