Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 07:55
Static task
static1
Behavioral task
behavioral1
Sample
5dc11ec3ef50428adbaddfe4b66c8b9c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5dc11ec3ef50428adbaddfe4b66c8b9c.exe
Resource
win10v2004-20231215-en
General
-
Target
5dc11ec3ef50428adbaddfe4b66c8b9c.exe
-
Size
2.5MB
-
MD5
5dc11ec3ef50428adbaddfe4b66c8b9c
-
SHA1
d1ec0d9a75326ff45cb0f9b0690c52ac09b97623
-
SHA256
cfe3d835275ab7d9317168a45294687e18004382e3af661bf8fc86c3446e12a8
-
SHA512
41e7bc131d06b83a286e9482a3b38aa514cefa631baecfcaad22febb378be3232b3ef31b788a0fe7139ae49056b75d5c319069ff63da5483dacdc6ba29c731bd
-
SSDEEP
24576:t8+kEW1dDBDtIiz++sprV6zJqKs/SjhDV:tQEWvZ9+Z69mkVV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" 5dc11ec3ef50428adbaddfe4b66c8b9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 5dc11ec3ef50428adbaddfe4b66c8b9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" 5dc11ec3ef50428adbaddfe4b66c8b9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} 5dc11ec3ef50428adbaddfe4b66c8b9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ 5dc11ec3ef50428adbaddfe4b66c8b9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" 5dc11ec3ef50428adbaddfe4b66c8b9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe -
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1956 fservice.exe 2684 services.exe -
Loads dropped DLL 7 IoCs
pid Process 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 2684 services.exe 2684 services.exe 1956 fservice.exe 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 2396 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ 5dc11ec3ef50428adbaddfe4b66c8b9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\reginv.dll services.exe File created C:\Windows\SysWOW64\fservice.exe services.exe File created C:\Windows\SysWOW64\fservice.exe 5dc11ec3ef50428adbaddfe4b66c8b9c.exe File opened for modification C:\Windows\SysWOW64\fservice.exe 5dc11ec3ef50428adbaddfe4b66c8b9c.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe 5dc11ec3ef50428adbaddfe4b66c8b9c.exe File opened for modification C:\Windows\system\sservice.exe 5dc11ec3ef50428adbaddfe4b66c8b9c.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2396 2684 WerFault.exe 29 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2684 services.exe 2684 services.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1956 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 28 PID 1724 wrote to memory of 1956 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 28 PID 1724 wrote to memory of 1956 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 28 PID 1724 wrote to memory of 1956 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 28 PID 1956 wrote to memory of 2684 1956 fservice.exe 29 PID 1956 wrote to memory of 2684 1956 fservice.exe 29 PID 1956 wrote to memory of 2684 1956 fservice.exe 29 PID 1956 wrote to memory of 2684 1956 fservice.exe 29 PID 1724 wrote to memory of 2608 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 31 PID 1724 wrote to memory of 2608 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 31 PID 1724 wrote to memory of 2608 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 31 PID 1724 wrote to memory of 2608 1724 5dc11ec3ef50428adbaddfe4b66c8b9c.exe 31 PID 2684 wrote to memory of 2396 2684 services.exe 32 PID 2684 wrote to memory of 2396 2684 services.exe 32 PID 2684 wrote to memory of 2396 2684 services.exe 32 PID 2684 wrote to memory of 2396 2684 services.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dc11ec3ef50428adbaddfe4b66c8b9c.exe"C:\Users\Admin\AppData\Local\Temp\5dc11ec3ef50428adbaddfe4b66c8b9c.exe"1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\services.exeC:\Windows\services.exe -XP3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 6044⤵
- Loads dropped DLL
- Program crash
PID:2396
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5dc11ec3ef50428adbaddfe4b66c8b9c.exe.bat2⤵
- Deletes itself
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55ecdcb9348e873b640b95ac0b702c680
SHA14d472f9e6bd54bf034b4175f907b7a83625942ae
SHA256fb9152dc04097d33f4d1f1f7d58eb5ee35cd6a7cac2867c14c389538be97472a
SHA5122a9dc18dfe2a94b325441d5c2614eabe8d047b3c8ca6ce5a1558b27af51f590cfd7d33a65f98e1fff99649f81db3a8938aa9bd1e38833e518604c6405d7761bc
-
Filesize
365KB
MD51816c89f5c18f4f978327e9c5fa6f584
SHA11f91ce6e54f9a6efa724d34fe37f4a9896601e79
SHA2565ae2527496274effafc011b330514ad0a399c6fc7550574b67a13594cc23086f
SHA5128c3ff79525b473aa7b57a19fa0075a11588543e9b8dc6dca32c45f36acf9770b2081811bdf861bdba54e040b9b5e930786317dfa5dc4d7085cf772b94d074f01
-
Filesize
565KB
MD5a84b8f56d681811833d63e2fde9f4fdc
SHA13d8f9d7982a9110ca36ff324712c40aa6854d269
SHA25692ddc51234407f18d2945cb2fb649e3ad89367bf5172d36a0c3f07fa1c55bfcd
SHA512776a82d2e0b012b4f6f6474e53be1cd173351f8b8b49f041b6cbabf25b312553accd3c113825b1b24381c75806102a20dd0aa666ac169bda5a3675c90687967f
-
Filesize
431KB
MD5b0aa1b5b8bb2b7e4078d0be392ae4533
SHA185c7038874fcdc5d00010ab832fd9ac68d0aa4a8
SHA256d38d5a7697eb7be3309cebac18851e258f36bc676ee7531bf555dcbba9c6919d
SHA512226f1f964a1a2349b2e4b5e51ca19a34d1809033a7ec3f1566151faf1ecbf03afee6f4974817b4475829a4e2d68e2931090f868632976e6b7b887ff1fb51d02c
-
Filesize
63KB
MD5f16ddde23820437c7a704d1c1605b2b8
SHA13bf6ca2543777aeb350e5210f98447527ad3635c
SHA256b333bfa7ea5924ce7a51dcb595eb06b55a1edee231aabc8ee9cf8445eda5888c
SHA5129567364cdeb8635e79cffb532a79d4a405d0cf8f92d2b6497fa898526e8364c3ae3070e307e4fd68db4c38357c1420ddaa7bdc2dd616a1b1a36cf36601ae8be9
-
Filesize
296KB
MD5c4fac78b4f379517f689508f103d9edb
SHA1437a43238c5760b8fc24e4e0270b79ea6d523759
SHA256d875815f4e9b831676ee8064a5fa545ea1ac9fece6e143ad3e3c25976ba94b69
SHA51207af5de7b1d1c63c2ef8274301d9db135b3f9ed87feede7e773088f9b283b96db9e7e56a95b41e5a4d08d7308a81385f28abc61f7b81f5687d631dec5785b9cf
-
Filesize
1.8MB
MD59b74608b041bb5692868c83d14a51b4c
SHA1f5948bf382efa6ff2d9643286b22da9104267a75
SHA2566126d458d9bd8aea727b99be97c947c5a50c9492307671f7141de41182f6ca8e
SHA512889f92f04b61d429f6b8af6e209205ac0d1bd977732d25ebfbd6d24e6640acc8609b85538f6718d199143640f4385aa8917d8465025785f18524d89609378137
-
Filesize
333KB
MD505df1499dce8fca5a3db766ae7a25756
SHA19949e6dbcb47e530cf7117e22228d2ef508f8643
SHA2566bc4c1a77040e0b379516d7ad0db139bfd1c067fc764e75b98bb5f95400a0d1c
SHA51224b64c137b180158ba499f77e684e575f5225327a33d1f089d8cd4e0f7245e871f3c71b41473281c30245fbd0182fd46fb4cd95775c15ceae5601e111f836419
-
Filesize
36KB
MD5d4a3f90e159ffbcbc4f9740de4b7f171
SHA10542f5d1e2c23dca8d90766b3a8537dc3880e5c9
SHA2562200dd5f83d2fb8c5d3994206a4fa9ff34b4cbfe56ed39a9a03c954cf45d8f77
SHA5125493beb50b5f7d8ec52f32718d01696916ae173456005d0c1294ce695161ce5004aff58ee3892bf5db0f9b23720146a6d3ae8ffbcbbd81f84d894fdc8cf75a94
-
Filesize
24KB
MD543e7d9b875c921ba6be38d45540fb9dd
SHA1f22a73fc0d4aa3ea6c0b8f61d974b028f308acc4
SHA256f1b2b0abe844e6ba812c7f8709a463a7f6c56fa6ac38d376a0739cc3469f795b
SHA5122e74e23c0875b69b82319391c392132f28f4eb45aa412805130382498ae48969a06a2b3a7528b626fa7d7ddb6b006f19f0ef8d73cf73cb9a0c0df44a21077622