Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
351fc04c0361cfb9608263ce035063f1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
351fc04c0361cfb9608263ce035063f1.exe
Resource
win10v2004-20231215-en
General
-
Target
351fc04c0361cfb9608263ce035063f1.exe
-
Size
490KB
-
MD5
351fc04c0361cfb9608263ce035063f1
-
SHA1
73422958618c9d984ed4ef4c2ba8a60a4ea63436
-
SHA256
04d85914871db991187661b756e878c545e71e41705fe4c027f85a5bf6e58c9b
-
SHA512
433c00ff7fe9b83084d5562661b0955378d930713e1a35112197e61ddae4db1fcf755f6082bcaa2a562faf7b4670da17c32dabab342888bec0a191277918934e
-
SSDEEP
6144:inJdiMUWMkEXe5npiM1VzRMwiKwZGg5IAHtdGlIS+Ln8mAzUoFr:sdiMUWMkEep91VVMvKI95IQ0lm78mAZ
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List hidserv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile hidserv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications hidserv.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\hidserv.exe" hidserv.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 351fc04c0361cfb9608263ce035063f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 351fc04c0361cfb9608263ce035063f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hidserv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate hidserv.exe -
Executes dropped EXE 2 IoCs
pid Process 1148 hidserv.exe 5084 hidserv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\hidserv.exe" hidserv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\hidserv.exe" hidserv.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2756 set thread context of 1472 2756 351fc04c0361cfb9608263ce035063f1.exe 92 PID 1148 set thread context of 5084 1148 hidserv.exe 94 -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174}\InProcServer32\ThreadingModel = "Both" 351fc04c0361cfb9608263ce035063f1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174} hidserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174} 351fc04c0361cfb9608263ce035063f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174}\ = "HomeGroup Network" 351fc04c0361cfb9608263ce035063f1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174}\InProcServer32 351fc04c0361cfb9608263ce035063f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174}\InProcServer32\ = "%SystemRoot%\\SysWow64\\provsvc.dll" 351fc04c0361cfb9608263ce035063f1.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1472 351fc04c0361cfb9608263ce035063f1.exe 1472 351fc04c0361cfb9608263ce035063f1.exe 5084 hidserv.exe 5084 hidserv.exe 5084 hidserv.exe 5084 hidserv.exe 5084 hidserv.exe 5084 hidserv.exe 5084 hidserv.exe 5084 hidserv.exe 5084 hidserv.exe 5084 hidserv.exe 5084 hidserv.exe 5084 hidserv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2756 351fc04c0361cfb9608263ce035063f1.exe Token: SeIncBasePriorityPrivilege 2756 351fc04c0361cfb9608263ce035063f1.exe Token: 33 1148 hidserv.exe Token: SeIncBasePriorityPrivilege 1148 hidserv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2756 351fc04c0361cfb9608263ce035063f1.exe 1148 hidserv.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1472 2756 351fc04c0361cfb9608263ce035063f1.exe 92 PID 2756 wrote to memory of 1472 2756 351fc04c0361cfb9608263ce035063f1.exe 92 PID 2756 wrote to memory of 1472 2756 351fc04c0361cfb9608263ce035063f1.exe 92 PID 2756 wrote to memory of 1472 2756 351fc04c0361cfb9608263ce035063f1.exe 92 PID 2756 wrote to memory of 1472 2756 351fc04c0361cfb9608263ce035063f1.exe 92 PID 2756 wrote to memory of 1472 2756 351fc04c0361cfb9608263ce035063f1.exe 92 PID 2756 wrote to memory of 1472 2756 351fc04c0361cfb9608263ce035063f1.exe 92 PID 2756 wrote to memory of 1472 2756 351fc04c0361cfb9608263ce035063f1.exe 92 PID 2756 wrote to memory of 1472 2756 351fc04c0361cfb9608263ce035063f1.exe 92 PID 1472 wrote to memory of 1148 1472 351fc04c0361cfb9608263ce035063f1.exe 93 PID 1472 wrote to memory of 1148 1472 351fc04c0361cfb9608263ce035063f1.exe 93 PID 1472 wrote to memory of 1148 1472 351fc04c0361cfb9608263ce035063f1.exe 93 PID 1148 wrote to memory of 5084 1148 hidserv.exe 94 PID 1148 wrote to memory of 5084 1148 hidserv.exe 94 PID 1148 wrote to memory of 5084 1148 hidserv.exe 94 PID 1148 wrote to memory of 5084 1148 hidserv.exe 94 PID 1148 wrote to memory of 5084 1148 hidserv.exe 94 PID 1148 wrote to memory of 5084 1148 hidserv.exe 94 PID 1148 wrote to memory of 5084 1148 hidserv.exe 94 PID 1148 wrote to memory of 5084 1148 hidserv.exe 94 PID 1148 wrote to memory of 5084 1148 hidserv.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\351fc04c0361cfb9608263ce035063f1.exe"C:\Users\Admin\AppData\Local\Temp\351fc04c0361cfb9608263ce035063f1.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\351fc04c0361cfb9608263ce035063f1.exe
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Roaming\hidserv.exe"C:\Users\Admin\AppData\Roaming\hidserv.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Roaming\hidserv.exe
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1