Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 21:12
Static task
static1
Behavioral task
behavioral1
Sample
127baaa04b2c8b5209d43735d6f10bdc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
127baaa04b2c8b5209d43735d6f10bdc.exe
Resource
win10v2004-20231215-en
General
-
Target
127baaa04b2c8b5209d43735d6f10bdc.exe
-
Size
751KB
-
MD5
127baaa04b2c8b5209d43735d6f10bdc
-
SHA1
e18164b6ddfa938757ebd999378e7a4f27c4238b
-
SHA256
965ddd7f32d239f30f2b06d754ae146c0bb420ed89f599823f9b3b08f73f14fe
-
SHA512
a82b543ee6e68a9314787744ef8260184a31db2b41de9b8a5ecf62e97088e850e41868e4e57de03d90dc5741d17f23854076846be838c0aac0fea7d19f9269ab
-
SSDEEP
1536:aZqjVsi+ylk2986K0brue5rIaTOKH0WkDKjpT0X:7VRhlk6jKKruW0sYKjpAX
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-4729467204670245028624525\winsvc.exe = "C:\\Users\\Admin\\M-4729467204670245028624525\\winsvc.exe:*:Enabled:Microsoft Windows Service" 127baaa04b2c8b5209d43735d6f10bdc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 127baaa04b2c8b5209d43735d6f10bdc.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 winsvc.exe 2868 winsvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2876 127baaa04b2c8b5209d43735d6f10bdc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Service = "C:\\Users\\Admin\\M-4729467204670245028624525\\winsvc.exe" 127baaa04b2c8b5209d43735d6f10bdc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2200 set thread context of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2804 set thread context of 2868 2804 winsvc.exe 30 -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2200 wrote to memory of 2876 2200 127baaa04b2c8b5209d43735d6f10bdc.exe 28 PID 2876 wrote to memory of 2804 2876 127baaa04b2c8b5209d43735d6f10bdc.exe 29 PID 2876 wrote to memory of 2804 2876 127baaa04b2c8b5209d43735d6f10bdc.exe 29 PID 2876 wrote to memory of 2804 2876 127baaa04b2c8b5209d43735d6f10bdc.exe 29 PID 2876 wrote to memory of 2804 2876 127baaa04b2c8b5209d43735d6f10bdc.exe 29 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30 PID 2804 wrote to memory of 2868 2804 winsvc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\127baaa04b2c8b5209d43735d6f10bdc.exe"C:\Users\Admin\AppData\Local\Temp\127baaa04b2c8b5209d43735d6f10bdc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\127baaa04b2c8b5209d43735d6f10bdc.exe"C:\Users\Admin\AppData\Local\Temp\127baaa04b2c8b5209d43735d6f10bdc.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\M-4729467204670245028624525\winsvc.exeC:\Users\Admin\M-4729467204670245028624525\winsvc.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\M-4729467204670245028624525\winsvc.exeC:\Users\Admin\M-4729467204670245028624525\winsvc.exe4⤵
- Executes dropped EXE
PID:2868
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5127baaa04b2c8b5209d43735d6f10bdc
SHA1e18164b6ddfa938757ebd999378e7a4f27c4238b
SHA256965ddd7f32d239f30f2b06d754ae146c0bb420ed89f599823f9b3b08f73f14fe
SHA512a82b543ee6e68a9314787744ef8260184a31db2b41de9b8a5ecf62e97088e850e41868e4e57de03d90dc5741d17f23854076846be838c0aac0fea7d19f9269ab