Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
sysran-uninstaller.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
sysran-uninstaller.exe
Resource
win10v2004-20230915-en
General
-
Target
sysran-uninstaller.exe
-
Size
14KB
-
MD5
0ae3f7173c12426eb46648e16973c0cc
-
SHA1
e6f564a0550cb9e8379419b27d19e2679d589920
-
SHA256
d53f259612e67e72889a97f32e6ac4899e9dacc629cd2da0e89714938e000255
-
SHA512
b1e8084487510aab47726ea08f2e7e8fadedd320926a4c4420a4f8c50876c8e231da05f9f690183487b983139a2c1236535f5eba308b90a170b2ccfa24409a78
-
SSDEEP
384:cIDtF5/TAFI2Dn2FoeU5X9BfgJn3vLcA0:JBAXroEt91ghX0
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts sysran-uninstaller.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2632 sc.exe 1724 sc.exe 2608 sc.exe 2660 sc.exe 2824 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2364 sysran-uninstaller.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2364 sysran-uninstaller.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2364 wrote to memory of 840 2364 sysran-uninstaller.exe 28 PID 2364 wrote to memory of 840 2364 sysran-uninstaller.exe 28 PID 2364 wrote to memory of 840 2364 sysran-uninstaller.exe 28 PID 2364 wrote to memory of 2020 2364 sysran-uninstaller.exe 30 PID 2364 wrote to memory of 2020 2364 sysran-uninstaller.exe 30 PID 2364 wrote to memory of 2020 2364 sysran-uninstaller.exe 30 PID 2020 wrote to memory of 2704 2020 cmd.exe 32 PID 2020 wrote to memory of 2704 2020 cmd.exe 32 PID 2020 wrote to memory of 2704 2020 cmd.exe 32 PID 840 wrote to memory of 2700 840 cmd.exe 33 PID 840 wrote to memory of 2700 840 cmd.exe 33 PID 840 wrote to memory of 2700 840 cmd.exe 33 PID 2364 wrote to memory of 2648 2364 sysran-uninstaller.exe 34 PID 2364 wrote to memory of 2648 2364 sysran-uninstaller.exe 34 PID 2364 wrote to memory of 2648 2364 sysran-uninstaller.exe 34 PID 2648 wrote to memory of 2744 2648 cmd.exe 36 PID 2648 wrote to memory of 2744 2648 cmd.exe 36 PID 2648 wrote to memory of 2744 2648 cmd.exe 36 PID 2648 wrote to memory of 2728 2648 cmd.exe 37 PID 2648 wrote to memory of 2728 2648 cmd.exe 37 PID 2648 wrote to memory of 2728 2648 cmd.exe 37 PID 2648 wrote to memory of 2732 2648 cmd.exe 38 PID 2648 wrote to memory of 2732 2648 cmd.exe 38 PID 2648 wrote to memory of 2732 2648 cmd.exe 38 PID 2648 wrote to memory of 2500 2648 cmd.exe 39 PID 2648 wrote to memory of 2500 2648 cmd.exe 39 PID 2648 wrote to memory of 2500 2648 cmd.exe 39 PID 2648 wrote to memory of 1288 2648 cmd.exe 40 PID 2648 wrote to memory of 1288 2648 cmd.exe 40 PID 2648 wrote to memory of 1288 2648 cmd.exe 40 PID 2648 wrote to memory of 2960 2648 cmd.exe 41 PID 2648 wrote to memory of 2960 2648 cmd.exe 41 PID 2648 wrote to memory of 2960 2648 cmd.exe 41 PID 2648 wrote to memory of 2612 2648 cmd.exe 42 PID 2648 wrote to memory of 2612 2648 cmd.exe 42 PID 2648 wrote to memory of 2612 2648 cmd.exe 42 PID 2648 wrote to memory of 2788 2648 cmd.exe 43 PID 2648 wrote to memory of 2788 2648 cmd.exe 43 PID 2648 wrote to memory of 2788 2648 cmd.exe 43 PID 2648 wrote to memory of 2520 2648 cmd.exe 45 PID 2648 wrote to memory of 2520 2648 cmd.exe 45 PID 2648 wrote to memory of 2520 2648 cmd.exe 45 PID 2648 wrote to memory of 2940 2648 cmd.exe 44 PID 2648 wrote to memory of 2940 2648 cmd.exe 44 PID 2648 wrote to memory of 2940 2648 cmd.exe 44 PID 2648 wrote to memory of 2824 2648 cmd.exe 46 PID 2648 wrote to memory of 2824 2648 cmd.exe 46 PID 2648 wrote to memory of 2824 2648 cmd.exe 46 PID 2648 wrote to memory of 1724 2648 cmd.exe 48 PID 2648 wrote to memory of 1724 2648 cmd.exe 48 PID 2648 wrote to memory of 1724 2648 cmd.exe 48 PID 2648 wrote to memory of 2632 2648 cmd.exe 47 PID 2648 wrote to memory of 2632 2648 cmd.exe 47 PID 2648 wrote to memory of 2632 2648 cmd.exe 47 PID 2648 wrote to memory of 2660 2648 cmd.exe 50 PID 2648 wrote to memory of 2660 2648 cmd.exe 50 PID 2648 wrote to memory of 2660 2648 cmd.exe 50 PID 2648 wrote to memory of 2608 2648 cmd.exe 49 PID 2648 wrote to memory of 2608 2648 cmd.exe 49 PID 2648 wrote to memory of 2608 2648 cmd.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\sysran-uninstaller.exe"C:\Users\Admin\AppData\Local\Temp\sysran-uninstaller.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /f2⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /f3⤵PID:2700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "GoogleUpdateTaskMachineQC"3⤵PID:2704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg copy "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc_bkp" "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /s /f & reg copy "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc_bkp" "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /s /f & reg copy "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv_bkp" "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /s /f & reg copy "HKLM\SYSTEM\CurrentControlSet\Services\BITS_bkp" "HKLM\SYSTEM\CurrentControlSet\Services\BITS" /s /f & reg copy "HKLM\SYSTEM\CurrentControlSet\Services\dosvc_bkp" "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /s /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc_bkp" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc_bkp" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv_bkp" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\BITS_bkp" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc_bkp" /f & sc start UsoSvc & sc start WaaSMedicSvc & sc start wuauserv & sc start bits & sc start dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\reg.exereg copy "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc_bkp" "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /s /f3⤵PID:2744
-
-
C:\Windows\system32\reg.exereg copy "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc_bkp" "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /s /f3⤵PID:2728
-
-
C:\Windows\system32\reg.exereg copy "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv_bkp" "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /s /f3⤵PID:2732
-
-
C:\Windows\system32\reg.exereg copy "HKLM\SYSTEM\CurrentControlSet\Services\BITS_bkp" "HKLM\SYSTEM\CurrentControlSet\Services\BITS" /s /f3⤵PID:2500
-
-
C:\Windows\system32\reg.exereg copy "HKLM\SYSTEM\CurrentControlSet\Services\dosvc_bkp" "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /s /f3⤵PID:1288
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc_bkp" /f3⤵PID:2960
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc_bkp" /f3⤵PID:2612
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv_bkp" /f3⤵PID:2788
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc_bkp" /f3⤵PID:2940
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\BITS_bkp" /f3⤵PID:2520
-
-
C:\Windows\system32\sc.exesc start UsoSvc3⤵
- Launches sc.exe
PID:2824
-
-
C:\Windows\system32\sc.exesc start wuauserv3⤵
- Launches sc.exe
PID:2632
-
-
C:\Windows\system32\sc.exesc start WaaSMedicSvc3⤵
- Launches sc.exe
PID:1724
-
-
C:\Windows\system32\sc.exesc start dosvc3⤵
- Launches sc.exe
PID:2608
-
-
C:\Windows\system32\sc.exesc start bits3⤵
- Launches sc.exe
PID:2660
-
-