Resubmissions
22/09/2023, 18:57
230922-xme3mabg82 1022/09/2023, 18:42
230922-xch2jahf81 1022/09/2023, 18:40
230922-xbbwtshf7z 1022/09/2023, 18:36
230922-w8437shf7s 1022/09/2023, 18:09
230922-wrfdhsbe98 10Analysis
-
max time kernel
56s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
DV.exe
Resource
win10v2004-20230915-en
General
-
Target
DV.exe
-
Size
5.4MB
-
MD5
974cf9781ee4c391d8c78f68247e1b18
-
SHA1
13fc489bc589af5ebb2524b5969ddb3c75ace905
-
SHA256
6f63952d569d65352cadb59dc95665dc01a2ccead6f2a84f8d89a9ee041aebe4
-
SHA512
80122ed3b11c053b6896cfe4320e4edfb16db3a2a8b1176daa3f1b0e4be00054d8139fc707047bcdc3426166ce9eb8f1a2da9a3de2ada0496c7c44510d6cc3ac
-
SSDEEP
98304:5Ni77gLVLRv0kFWEu4f06A9u4f+38+BscmQI0vjkaYgucBg0i:5Ni77oVJ0kFWn4sWL3R7mQPuoE
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 4508 created 3192 4508 DV.exe 62 PID 4508 created 3192 4508 DV.exe 62 PID 4508 created 3192 4508 DV.exe 62 PID 4508 created 3192 4508 DV.exe 62 PID 4508 created 3192 4508 DV.exe 62 PID 4508 created 3192 4508 DV.exe 62 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts DV.exe -
Stops running service(s) 3 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4508 set thread context of 440 4508 DV.exe 110 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3856 sc.exe 2120 sc.exe 2176 sc.exe 3688 sc.exe 3360 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1248 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4508 DV.exe 4508 DV.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 4508 DV.exe 4508 DV.exe 4508 DV.exe 4508 DV.exe 4508 DV.exe 4508 DV.exe 4508 DV.exe 4508 DV.exe 440 dialer.exe 440 dialer.exe 4508 DV.exe 4508 DV.exe 440 dialer.exe 440 dialer.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3428 powershell.exe Token: SeShutdownPrivilege 3748 powercfg.exe Token: SeCreatePagefilePrivilege 3748 powercfg.exe Token: SeDebugPrivilege 440 dialer.exe Token: SeShutdownPrivilege 3932 powercfg.exe Token: SeCreatePagefilePrivilege 3932 powercfg.exe Token: SeShutdownPrivilege 2208 powercfg.exe Token: SeCreatePagefilePrivilege 2208 powercfg.exe Token: SeShutdownPrivilege 2484 powercfg.exe Token: SeCreatePagefilePrivilege 2484 powercfg.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3716 wrote to memory of 3856 3716 cmd.exe 103 PID 3716 wrote to memory of 3856 3716 cmd.exe 103 PID 3716 wrote to memory of 2120 3716 cmd.exe 104 PID 3716 wrote to memory of 2120 3716 cmd.exe 104 PID 3716 wrote to memory of 2176 3716 cmd.exe 105 PID 3716 wrote to memory of 2176 3716 cmd.exe 105 PID 3716 wrote to memory of 3688 3716 cmd.exe 106 PID 3716 wrote to memory of 3688 3716 cmd.exe 106 PID 3716 wrote to memory of 3360 3716 cmd.exe 107 PID 3716 wrote to memory of 3360 3716 cmd.exe 107 PID 3596 wrote to memory of 3748 3596 cmd.exe 111 PID 3596 wrote to memory of 3748 3596 cmd.exe 111 PID 4508 wrote to memory of 440 4508 DV.exe 110 PID 3596 wrote to memory of 3932 3596 cmd.exe 114 PID 3596 wrote to memory of 3932 3596 cmd.exe 114 PID 3596 wrote to memory of 2208 3596 cmd.exe 117 PID 3596 wrote to memory of 2208 3596 cmd.exe 117 PID 3596 wrote to memory of 2484 3596 cmd.exe 118 PID 3596 wrote to memory of 2484 3596 cmd.exe 118 PID 440 wrote to memory of 612 440 dialer.exe 3 PID 440 wrote to memory of 676 440 dialer.exe 1 PID 440 wrote to memory of 952 440 dialer.exe 80 PID 676 wrote to memory of 2472 676 lsass.exe 21 PID 440 wrote to memory of 1012 440 dialer.exe 9 PID 440 wrote to memory of 408 440 dialer.exe 79 PID 676 wrote to memory of 2472 676 lsass.exe 21 PID 676 wrote to memory of 2472 676 lsass.exe 21 PID 440 wrote to memory of 996 440 dialer.exe 78 PID 676 wrote to memory of 2472 676 lsass.exe 21 PID 440 wrote to memory of 1068 440 dialer.exe 13 PID 676 wrote to memory of 2472 676 lsass.exe 21 PID 440 wrote to memory of 1076 440 dialer.exe 11 PID 440 wrote to memory of 1136 440 dialer.exe 12 PID 440 wrote to memory of 1184 440 dialer.exe 77 PID 440 wrote to memory of 1224 440 dialer.exe 16 PID 440 wrote to memory of 1240 440 dialer.exe 14 PID 440 wrote to memory of 1368 440 dialer.exe 15 PID 440 wrote to memory of 1384 440 dialer.exe 76 PID 440 wrote to memory of 1440 440 dialer.exe 17 PID 440 wrote to memory of 1448 440 dialer.exe 75 PID 440 wrote to memory of 1480 440 dialer.exe 74 PID 440 wrote to memory of 1580 440 dialer.exe 73 PID 440 wrote to memory of 1648 440 dialer.exe 72 PID 440 wrote to memory of 1656 440 dialer.exe 71 PID 440 wrote to memory of 1744 440 dialer.exe 70 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:676
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1012
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1068
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1440
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2472
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\DV.exe"C:\Users\Admin\AppData\Local\Temp\DV.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3856
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2120
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2176
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3688
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3360
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:440
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateForcefully"2⤵PID:4684
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateForcefully" /xml "C:\Users\Admin\AppData\Local\Temp\qgpsiwwqbudw.xml"2⤵
- Creates scheduled task(s)
PID:1248
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1480
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1184
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD584ee42fe9a79a7eb9c9f96ab678af294
SHA162406990bcda0de8354575147aa07161be1ab194
SHA2561e806c8c561abb9100a544eca8894f0c9b98f0859d92b277b6b511125f5c7427
SHA51278ca886963a281e1164d6baebc285f62724b2a160d060b3bec43b5e0df0c6a13b58b36339318993e1306e86360ed591f2d2ffdf4af3f46b0aceacf9cbee66710