Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
127baaa04b2c8b5209d43735d6f10bdc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
127baaa04b2c8b5209d43735d6f10bdc.exe
Resource
win10v2004-20231215-en
General
-
Target
127baaa04b2c8b5209d43735d6f10bdc.exe
-
Size
751KB
-
MD5
127baaa04b2c8b5209d43735d6f10bdc
-
SHA1
e18164b6ddfa938757ebd999378e7a4f27c4238b
-
SHA256
965ddd7f32d239f30f2b06d754ae146c0bb420ed89f599823f9b3b08f73f14fe
-
SHA512
a82b543ee6e68a9314787744ef8260184a31db2b41de9b8a5ecf62e97088e850e41868e4e57de03d90dc5741d17f23854076846be838c0aac0fea7d19f9269ab
-
SSDEEP
1536:aZqjVsi+ylk2986K0brue5rIaTOKH0WkDKjpT0X:7VRhlk6jKKruW0sYKjpAX
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-4729467204670245028624525\winsvc.exe = "C:\\Users\\Admin\\M-4729467204670245028624525\\winsvc.exe:*:Enabled:Microsoft Windows Service" 127baaa04b2c8b5209d43735d6f10bdc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 127baaa04b2c8b5209d43735d6f10bdc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 127baaa04b2c8b5209d43735d6f10bdc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 127baaa04b2c8b5209d43735d6f10bdc.exe -
Executes dropped EXE 2 IoCs
pid Process 1800 winsvc.exe 1700 winsvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Service = "C:\\Users\\Admin\\M-4729467204670245028624525\\winsvc.exe" 127baaa04b2c8b5209d43735d6f10bdc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2096 set thread context of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 1800 set thread context of 1700 1800 winsvc.exe 93 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 2096 wrote to memory of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 2096 wrote to memory of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 2096 wrote to memory of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 2096 wrote to memory of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 2096 wrote to memory of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 2096 wrote to memory of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 2096 wrote to memory of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 2096 wrote to memory of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 2096 wrote to memory of 2948 2096 127baaa04b2c8b5209d43735d6f10bdc.exe 91 PID 2948 wrote to memory of 1800 2948 127baaa04b2c8b5209d43735d6f10bdc.exe 92 PID 2948 wrote to memory of 1800 2948 127baaa04b2c8b5209d43735d6f10bdc.exe 92 PID 2948 wrote to memory of 1800 2948 127baaa04b2c8b5209d43735d6f10bdc.exe 92 PID 1800 wrote to memory of 1700 1800 winsvc.exe 93 PID 1800 wrote to memory of 1700 1800 winsvc.exe 93 PID 1800 wrote to memory of 1700 1800 winsvc.exe 93 PID 1800 wrote to memory of 1700 1800 winsvc.exe 93 PID 1800 wrote to memory of 1700 1800 winsvc.exe 93 PID 1800 wrote to memory of 1700 1800 winsvc.exe 93 PID 1800 wrote to memory of 1700 1800 winsvc.exe 93 PID 1800 wrote to memory of 1700 1800 winsvc.exe 93 PID 1800 wrote to memory of 1700 1800 winsvc.exe 93 PID 1800 wrote to memory of 1700 1800 winsvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\127baaa04b2c8b5209d43735d6f10bdc.exe"C:\Users\Admin\AppData\Local\Temp\127baaa04b2c8b5209d43735d6f10bdc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\127baaa04b2c8b5209d43735d6f10bdc.exe"C:\Users\Admin\AppData\Local\Temp\127baaa04b2c8b5209d43735d6f10bdc.exe"2⤵
- Modifies firewall policy service
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\M-4729467204670245028624525\winsvc.exeC:\Users\Admin\M-4729467204670245028624525\winsvc.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\M-4729467204670245028624525\winsvc.exeC:\Users\Admin\M-4729467204670245028624525\winsvc.exe4⤵
- Executes dropped EXE
PID:1700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5127baaa04b2c8b5209d43735d6f10bdc
SHA1e18164b6ddfa938757ebd999378e7a4f27c4238b
SHA256965ddd7f32d239f30f2b06d754ae146c0bb420ed89f599823f9b3b08f73f14fe
SHA512a82b543ee6e68a9314787744ef8260184a31db2b41de9b8a5ecf62e97088e850e41868e4e57de03d90dc5741d17f23854076846be838c0aac0fea7d19f9269ab