Analysis
-
max time kernel
124s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2023 00:39
Behavioral task
behavioral1
Sample
Servexxxr.exe
Resource
win7-20230621-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Servexxxr.exe
Resource
win10v2004-20230621-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
Servexxxr.exe
-
Size
93KB
-
MD5
bac3e3a27867ed4fec83edffd7cdf851
-
SHA1
ee1339a375d50b0aa1459543f2aacaab5c810c9c
-
SHA256
a2c863ccc540a385073d3b08ab8fb1ec6c1d23b599b57a13a604002cba27f2a4
-
SHA512
09ca8b12914d0da03797f8b34c7cd5f6ea42e94919d0c40270b88a110ee285372ad910b506311662a77620426a03dbf8cc8daccb6e9c4ddf6ece060f428b4721
-
SSDEEP
1536:1U33wHyNxrBhh5YLg1jEwzGi1dDbDEgS:1UKyNxrBhLggCi1dj9
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Drops file in System32 directory 8 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{336BB4CD-08B2-4BEE-B521-CEB34A961BDC}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{FED0556C-9C95-4FE3-90D1-7C842660BC23}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{EFD6BD40-1E51-461A-97AD-F340098DA388}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{DFBFFAB0-70A2-496D-82C4-CE1230922607}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{C3ECA32A-E4C8-45B9-BB92-390FC12C91AF}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{AF3307A9-A16D-49A7-9EF2-A59B1BE6A13A}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{B8FB045D-59F4-4653-8555-B90F95A63629}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{EFA7BB62-9DC7-4183-8CF2-4159EFBD9800}.catalogItem svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Servexxxr.exepid process 2248 Servexxxr.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
Servexxxr.exedescription pid process Token: SeDebugPrivilege 2248 Servexxxr.exe Token: 33 2248 Servexxxr.exe Token: SeIncBasePriorityPrivilege 2248 Servexxxr.exe Token: 33 2248 Servexxxr.exe Token: SeIncBasePriorityPrivilege 2248 Servexxxr.exe Token: 33 2248 Servexxxr.exe Token: SeIncBasePriorityPrivilege 2248 Servexxxr.exe Token: 33 2248 Servexxxr.exe Token: SeIncBasePriorityPrivilege 2248 Servexxxr.exe Token: 33 2248 Servexxxr.exe Token: SeIncBasePriorityPrivilege 2248 Servexxxr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Servexxxr.execmd.exedescription pid process target process PID 2248 wrote to memory of 2036 2248 Servexxxr.exe netsh.exe PID 2248 wrote to memory of 2036 2248 Servexxxr.exe netsh.exe PID 2248 wrote to memory of 2036 2248 Servexxxr.exe netsh.exe PID 2248 wrote to memory of 4428 2248 Servexxxr.exe netsh.exe PID 2248 wrote to memory of 4428 2248 Servexxxr.exe netsh.exe PID 2248 wrote to memory of 4428 2248 Servexxxr.exe netsh.exe PID 2248 wrote to memory of 4508 2248 Servexxxr.exe cmd.exe PID 2248 wrote to memory of 4508 2248 Servexxxr.exe cmd.exe PID 2248 wrote to memory of 4508 2248 Servexxxr.exe cmd.exe PID 4508 wrote to memory of 4172 4508 cmd.exe PING.EXE PID 4508 wrote to memory of 4172 4508 cmd.exe PING.EXE PID 4508 wrote to memory of 4172 4508 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe" "Servexxxr.exe" ENABLE2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 0 -n 23⤵
- Runs ping.exe
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2248-134-0x0000000000AA0000-0x0000000000AB0000-memory.dmpFilesize
64KB
-
memory/2248-135-0x0000000000AA0000-0x0000000000AB0000-memory.dmpFilesize
64KB
-
memory/2248-136-0x0000000000AA0000-0x0000000000AB0000-memory.dmpFilesize
64KB
-
memory/2248-137-0x0000000000AA0000-0x0000000000AB0000-memory.dmpFilesize
64KB