Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
sysran - 副本.exe
Resource
win7-20230831-en
General
-
Target
sysran - 副本.exe
-
Size
5.2MB
-
MD5
6e33878559f72813842849a3f50bf84f
-
SHA1
3a9f03b46c767776a8d3d5fd474cdbfec2e6f2d3
-
SHA256
8066b322136c434437c4754418e75779ccb560b802bded19356427ec2c10ea52
-
SHA512
ec5607b2eda5239694cf696d836df1af8953ee30737e5a7a0fcbebfbdefdce812338a4db05cb61fccd49092e0a8842e34648d7bb2249174484db4670e5b9aa66
-
SSDEEP
98304:q4qdva9J5hbLhDCis2yAXI7WRQDXtT35CukrTk:q/kJ7bZCis2yAXIJ5urTk
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
description pid Process procid_target PID 1648 created 1220 1648 sysran - 副本.exe 19 PID 1648 created 1220 1648 sysran - 副本.exe 19 PID 1648 created 1220 1648 sysran - 副本.exe 19 PID 1648 created 1220 1648 sysran - 副本.exe 19 PID 1648 created 1220 1648 sysran - 副本.exe 19 PID 1648 created 1220 1648 sysran - 副本.exe 19 PID 2872 created 1220 2872 updater.exe 19 PID 2872 created 1220 2872 updater.exe 19 PID 2872 created 1220 2872 updater.exe 19 PID 2872 created 1220 2872 updater.exe 19 PID 2872 created 1220 2872 updater.exe 19 PID 2872 created 1220 2872 updater.exe 19 -
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/1632-43-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1632-46-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1632-48-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1632-50-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1632-52-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1632-54-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1632-56-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1632-58-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts sysran - 副本.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 468 Process not Found 2872 updater.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2872 set thread context of 1008 2872 updater.exe 69 PID 2872 set thread context of 1632 2872 updater.exe 70 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe sysran - 副本.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2044 sc.exe 2808 sc.exe 2716 sc.exe 1188 sc.exe 1380 sc.exe 2792 sc.exe 2636 sc.exe 1952 sc.exe 1868 sc.exe 1272 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2564 schtasks.exe 676 schtasks.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 8031415b86ffd901 powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1648 sysran - 副本.exe 1648 sysran - 副本.exe 1948 powershell.exe 1648 sysran - 副本.exe 1648 sysran - 副本.exe 1648 sysran - 副本.exe 1648 sysran - 副本.exe 1648 sysran - 副本.exe 1648 sysran - 副本.exe 1648 sysran - 副本.exe 1648 sysran - 副本.exe 1648 sysran - 副本.exe 1648 sysran - 副本.exe 2872 updater.exe 2872 updater.exe 2376 powershell.exe 2872 updater.exe 2872 updater.exe 2872 updater.exe 2872 updater.exe 2872 updater.exe 2872 updater.exe 2872 updater.exe 2872 updater.exe 2872 updater.exe 2872 updater.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1948 powershell.exe Token: SeShutdownPrivilege 2536 powercfg.exe Token: SeShutdownPrivilege 1628 powercfg.exe Token: SeShutdownPrivilege 2572 powercfg.exe Token: SeShutdownPrivilege 2584 powercfg.exe Token: SeDebugPrivilege 2376 powershell.exe Token: SeShutdownPrivilege 2864 powercfg.exe Token: SeShutdownPrivilege 2852 powercfg.exe Token: SeShutdownPrivilege 2836 powercfg.exe Token: SeShutdownPrivilege 2684 powercfg.exe Token: SeDebugPrivilege 2872 updater.exe Token: SeLockMemoryPrivilege 1632 explorer.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2792 2628 cmd.exe 32 PID 2628 wrote to memory of 2792 2628 cmd.exe 32 PID 2628 wrote to memory of 2792 2628 cmd.exe 32 PID 2628 wrote to memory of 2044 2628 cmd.exe 33 PID 2628 wrote to memory of 2044 2628 cmd.exe 33 PID 2628 wrote to memory of 2044 2628 cmd.exe 33 PID 2628 wrote to memory of 2636 2628 cmd.exe 34 PID 2628 wrote to memory of 2636 2628 cmd.exe 34 PID 2628 wrote to memory of 2636 2628 cmd.exe 34 PID 2628 wrote to memory of 1952 2628 cmd.exe 35 PID 2628 wrote to memory of 1952 2628 cmd.exe 35 PID 2628 wrote to memory of 1952 2628 cmd.exe 35 PID 2628 wrote to memory of 2808 2628 cmd.exe 36 PID 2628 wrote to memory of 2808 2628 cmd.exe 36 PID 2628 wrote to memory of 2808 2628 cmd.exe 36 PID 2948 wrote to memory of 2536 2948 cmd.exe 41 PID 2948 wrote to memory of 2536 2948 cmd.exe 41 PID 2948 wrote to memory of 2536 2948 cmd.exe 41 PID 2948 wrote to memory of 1628 2948 cmd.exe 44 PID 2948 wrote to memory of 1628 2948 cmd.exe 44 PID 2948 wrote to memory of 1628 2948 cmd.exe 44 PID 2948 wrote to memory of 2572 2948 cmd.exe 45 PID 2948 wrote to memory of 2572 2948 cmd.exe 45 PID 2948 wrote to memory of 2572 2948 cmd.exe 45 PID 2948 wrote to memory of 2584 2948 cmd.exe 46 PID 2948 wrote to memory of 2584 2948 cmd.exe 46 PID 2948 wrote to memory of 2584 2948 cmd.exe 46 PID 1924 wrote to memory of 2716 1924 cmd.exe 56 PID 1924 wrote to memory of 2716 1924 cmd.exe 56 PID 1924 wrote to memory of 2716 1924 cmd.exe 56 PID 1924 wrote to memory of 1188 1924 cmd.exe 57 PID 1924 wrote to memory of 1188 1924 cmd.exe 57 PID 1924 wrote to memory of 1188 1924 cmd.exe 57 PID 1924 wrote to memory of 1868 1924 cmd.exe 58 PID 1924 wrote to memory of 1868 1924 cmd.exe 58 PID 1924 wrote to memory of 1868 1924 cmd.exe 58 PID 1924 wrote to memory of 1272 1924 cmd.exe 60 PID 1924 wrote to memory of 1272 1924 cmd.exe 60 PID 1924 wrote to memory of 1272 1924 cmd.exe 60 PID 1924 wrote to memory of 1380 1924 cmd.exe 59 PID 1924 wrote to memory of 1380 1924 cmd.exe 59 PID 1924 wrote to memory of 1380 1924 cmd.exe 59 PID 1312 wrote to memory of 2864 1312 cmd.exe 65 PID 1312 wrote to memory of 2864 1312 cmd.exe 65 PID 1312 wrote to memory of 2864 1312 cmd.exe 65 PID 1312 wrote to memory of 2852 1312 cmd.exe 66 PID 1312 wrote to memory of 2852 1312 cmd.exe 66 PID 1312 wrote to memory of 2852 1312 cmd.exe 66 PID 1312 wrote to memory of 2836 1312 cmd.exe 67 PID 1312 wrote to memory of 2836 1312 cmd.exe 67 PID 1312 wrote to memory of 2836 1312 cmd.exe 67 PID 1312 wrote to memory of 2684 1312 cmd.exe 68 PID 1312 wrote to memory of 2684 1312 cmd.exe 68 PID 1312 wrote to memory of 2684 1312 cmd.exe 68 PID 2872 wrote to memory of 1008 2872 updater.exe 69 PID 2872 wrote to memory of 1632 2872 updater.exe 70 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\sysran - 副本.exe"C:\Users\Admin\AppData\Local\Temp\sysran - 副本.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2792
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2044
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2636
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1952
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2808
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:3040
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\xbpxoyrdaild.xml"2⤵
- Creates scheduled task(s)
PID:2564
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2716
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1188
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1868
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1380
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1272
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\xbpxoyrdaild.xml"2⤵
- Creates scheduled task(s)
PID:676
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1008
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD56e33878559f72813842849a3f50bf84f
SHA13a9f03b46c767776a8d3d5fd474cdbfec2e6f2d3
SHA2568066b322136c434437c4754418e75779ccb560b802bded19356427ec2c10ea52
SHA512ec5607b2eda5239694cf696d836df1af8953ee30737e5a7a0fcbebfbdefdce812338a4db05cb61fccd49092e0a8842e34648d7bb2249174484db4670e5b9aa66
-
Filesize
5.2MB
MD56e33878559f72813842849a3f50bf84f
SHA13a9f03b46c767776a8d3d5fd474cdbfec2e6f2d3
SHA2568066b322136c434437c4754418e75779ccb560b802bded19356427ec2c10ea52
SHA512ec5607b2eda5239694cf696d836df1af8953ee30737e5a7a0fcbebfbdefdce812338a4db05cb61fccd49092e0a8842e34648d7bb2249174484db4670e5b9aa66
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
5.2MB
MD56e33878559f72813842849a3f50bf84f
SHA13a9f03b46c767776a8d3d5fd474cdbfec2e6f2d3
SHA2568066b322136c434437c4754418e75779ccb560b802bded19356427ec2c10ea52
SHA512ec5607b2eda5239694cf696d836df1af8953ee30737e5a7a0fcbebfbdefdce812338a4db05cb61fccd49092e0a8842e34648d7bb2249174484db4670e5b9aa66