Analysis

  • max time kernel
    124s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-06-2023 00:39

General

  • Target

    Servexxxr.exe

  • Size

    93KB

  • MD5

    bac3e3a27867ed4fec83edffd7cdf851

  • SHA1

    ee1339a375d50b0aa1459543f2aacaab5c810c9c

  • SHA256

    a2c863ccc540a385073d3b08ab8fb1ec6c1d23b599b57a13a604002cba27f2a4

  • SHA512

    09ca8b12914d0da03797f8b34c7cd5f6ea42e94919d0c40270b88a110ee285372ad910b506311662a77620426a03dbf8cc8daccb6e9c4ddf6ece060f428b4721

  • SSDEEP

    1536:1U33wHyNxrBhh5YLg1jEwzGi1dDbDEgS:1UKyNxrBhLggCi1dj9

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Drops file in System32 directory 8 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe
    "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe" "Servexxxr.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:2036
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"
      2⤵
      • Modifies Windows Firewall
      PID:4428
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Windows\SysWOW64\PING.EXE
        ping 0 -n 2
        3⤵
        • Runs ping.exe
        PID:4172
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    PID:4728

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2248-134-0x0000000000AA0000-0x0000000000AB0000-memory.dmp
    Filesize

    64KB

  • memory/2248-135-0x0000000000AA0000-0x0000000000AB0000-memory.dmp
    Filesize

    64KB

  • memory/2248-136-0x0000000000AA0000-0x0000000000AB0000-memory.dmp
    Filesize

    64KB

  • memory/2248-137-0x0000000000AA0000-0x0000000000AB0000-memory.dmp
    Filesize

    64KB