Analysis
-
max time kernel
139s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 13:07
Static task
static1
Behavioral task
behavioral1
Sample
70e1682854e1b5771b91eb317df85bd8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70e1682854e1b5771b91eb317df85bd8.exe
Resource
win10v2004-20231215-en
General
-
Target
70e1682854e1b5771b91eb317df85bd8.exe
-
Size
204KB
-
MD5
70e1682854e1b5771b91eb317df85bd8
-
SHA1
cccf0c59a8071485f23a36488b9eb65b7d5e23de
-
SHA256
5a33e61b6625e2cac6ce1b3cfb05958cda95b7257d50e1d0108b83596392a5b6
-
SHA512
a9fedcaa034c78463933a0347a525618ed01114956c8779f90dac5dfeec2f84ea6a903f7b65cd62b942084d181bc510138824b9554f5eeffb1eb5d2ebe9072d4
-
SSDEEP
6144:9GaO0vYQoJfzRMgSf27kBPpVrixUG/NE:9GpQUzRMzNBPDrPGW
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 70e1682854e1b5771b91eb317df85bd8.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\75439967573920484\winsvr.exe = "C:\\Users\\Admin\\75439967573920484\\winsvr.exe:*:Enabled:Windows Service" 70e1682854e1b5771b91eb317df85bd8.exe -
Executes dropped EXE 2 IoCs
pid Process 2036 winsvr.exe 2620 winsvr.exe -
Loads dropped DLL 2 IoCs
pid Process 1828 70e1682854e1b5771b91eb317df85bd8.exe 1828 70e1682854e1b5771b91eb317df85bd8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Users\\Admin\\75439967573920484\\winsvr.exe" 70e1682854e1b5771b91eb317df85bd8.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2500 set thread context of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2036 set thread context of 2620 2036 winsvr.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2500 70e1682854e1b5771b91eb317df85bd8.exe 2036 winsvr.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 2500 wrote to memory of 1828 2500 70e1682854e1b5771b91eb317df85bd8.exe 28 PID 1828 wrote to memory of 2036 1828 70e1682854e1b5771b91eb317df85bd8.exe 29 PID 1828 wrote to memory of 2036 1828 70e1682854e1b5771b91eb317df85bd8.exe 29 PID 1828 wrote to memory of 2036 1828 70e1682854e1b5771b91eb317df85bd8.exe 29 PID 1828 wrote to memory of 2036 1828 70e1682854e1b5771b91eb317df85bd8.exe 29 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30 PID 2036 wrote to memory of 2620 2036 winsvr.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\70e1682854e1b5771b91eb317df85bd8.exe"C:\Users\Admin\AppData\Local\Temp\70e1682854e1b5771b91eb317df85bd8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\70e1682854e1b5771b91eb317df85bd8.exe"C:\Users\Admin\AppData\Local\Temp\70e1682854e1b5771b91eb317df85bd8.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\75439967573920484\winsvr.exe"C:\Users\Admin\75439967573920484\winsvr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\75439967573920484\winsvr.exe"C:\Users\Admin\75439967573920484\winsvr.exe"4⤵
- Executes dropped EXE
PID:2620
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1