Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 03:18
Static task
static1
Behavioral task
behavioral1
Sample
4fa6c1c17e7c1296d9eef7676b948c46.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4fa6c1c17e7c1296d9eef7676b948c46.exe
Resource
win10v2004-20231215-en
General
-
Target
4fa6c1c17e7c1296d9eef7676b948c46.exe
-
Size
75KB
-
MD5
4fa6c1c17e7c1296d9eef7676b948c46
-
SHA1
27bdc174fa02ff18f4d5bafd622d46fdb9bd1b3f
-
SHA256
02d1aed87366355321948056b3b3ebeb32b12d4db7423bae8b31d174d72d4da8
-
SHA512
e5fa924db2facf47cd8ea14878c51be73dd81311d67aea05c3c5106817763e50d3d60667987ab76f98f6a0c2378c443fc99a4e526e093e81693548b282604d81
-
SSDEEP
1536:RGjac6lUu4sjBS28Ck89bcRobapREOm9FbOBWVe/bEw3BWF17xwhHKnLB8NhZg/3:RG+baBL30F11whqnNz/OB/q
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 4 IoCs
pid Process 3000 netsh.exe 2968 netsh.exe 1964 netsh.exe 2996 netsh.exe -
Deletes itself 1 IoCs
pid Process 2832 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2836 syshost.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 176.58.118.172 -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat syshost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Installer\{3CED3073-1FEE-B408-8F6B-F5446E394429}\syshost.exe 4fa6c1c17e7c1296d9eef7676b948c46.exe File opened for modification C:\Windows\Installer\{3CED3073-1FEE-B408-8F6B-F5446E394429}\syshost.exe 4fa6c1c17e7c1296d9eef7676b948c46.exe File opened for modification C:\Windows\Installer\{3CED3073-1FEE-B408-8F6B-F5446E394429}\syshost.exe.tmp syshost.exe -
Modifies data under HKEY_USERS 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix syshost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" syshost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" syshost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 syshost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings syshost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 syshost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" syshost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings syshost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections syshost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2836 syshost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2532 4fa6c1c17e7c1296d9eef7676b948c46.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 2836 syshost.exe Token: SeIncreaseQuotaPrivilege 2836 syshost.exe Token: SeShutdownPrivilege 2836 syshost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2832 2532 4fa6c1c17e7c1296d9eef7676b948c46.exe 29 PID 2532 wrote to memory of 2832 2532 4fa6c1c17e7c1296d9eef7676b948c46.exe 29 PID 2532 wrote to memory of 2832 2532 4fa6c1c17e7c1296d9eef7676b948c46.exe 29 PID 2532 wrote to memory of 2832 2532 4fa6c1c17e7c1296d9eef7676b948c46.exe 29 PID 2836 wrote to memory of 3000 2836 syshost.exe 31 PID 2836 wrote to memory of 3000 2836 syshost.exe 31 PID 2836 wrote to memory of 3000 2836 syshost.exe 31 PID 2836 wrote to memory of 3000 2836 syshost.exe 31 PID 2836 wrote to memory of 2996 2836 syshost.exe 40 PID 2836 wrote to memory of 2996 2836 syshost.exe 40 PID 2836 wrote to memory of 2996 2836 syshost.exe 40 PID 2836 wrote to memory of 2996 2836 syshost.exe 40 PID 2836 wrote to memory of 2968 2836 syshost.exe 35 PID 2836 wrote to memory of 2968 2836 syshost.exe 35 PID 2836 wrote to memory of 2968 2836 syshost.exe 35 PID 2836 wrote to memory of 2968 2836 syshost.exe 35 PID 2836 wrote to memory of 1964 2836 syshost.exe 38 PID 2836 wrote to memory of 1964 2836 syshost.exe 38 PID 2836 wrote to memory of 1964 2836 syshost.exe 38 PID 2836 wrote to memory of 1964 2836 syshost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fa6c1c17e7c1296d9eef7676b948c46.exe"C:\Users\Admin\AppData\Local\Temp\4fa6c1c17e7c1296d9eef7676b948c46.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\2915685.tmp"2⤵
- Deletes itself
PID:2832
-
-
C:\Windows\Installer\{3CED3073-1FEE-B408-8F6B-F5446E394429}\syshost.exe"C:\Windows\Installer\{3CED3073-1FEE-B408-8F6B-F5446E394429}\syshost.exe" /service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall set rule name="Core Networking - System IP Core" dir=in new action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:3000
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall set rule name="Core Networking - System IP Core" dir=out new action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2968
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Core Networking - System IP Core" dir=out action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1964
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Core Networking - System IP Core" dir=in action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2996
-