Analysis
-
max time kernel
139s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
1005bd1d763db09f6780f5d298fc089b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1005bd1d763db09f6780f5d298fc089b.exe
Resource
win10v2004-20231215-en
General
-
Target
1005bd1d763db09f6780f5d298fc089b.exe
-
Size
27KB
-
MD5
1005bd1d763db09f6780f5d298fc089b
-
SHA1
f49b38004fbef779fe6b1bb28d74bc02a664a3fe
-
SHA256
5a907c82c953724497b8c703c14051f2dcc2002192e18715f9f10e18862eda8b
-
SHA512
e68b7b3999378d278ae57aad57c47d089a4c486717247e6e97bee9b19878a4f686eebe13121dd4213c5033088c2f968610cf2c4e985e09e0c79ea3e50c59131f
-
SSDEEP
768:3Up/cZ2HW60/0nnsCCyhkM4nDOAQiICVL6oL:tZ22LsnnFCAJ4y8ICFt
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\msupdate\ImagePath = "c:\\windows\\system32\\mssrv32.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 1456 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\mssrv32.exe 1005bd1d763db09f6780f5d298fc089b.exe File opened for modification \??\c:\windows\SysWOW64\mssrv32.exe 1005bd1d763db09f6780f5d298fc089b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2284 set thread context of 1456 2284 1005bd1d763db09f6780f5d298fc089b.exe 94 -
Program crash 1 IoCs
pid pid_target Process procid_target 4740 1456 WerFault.exe 94 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1824 1005bd1d763db09f6780f5d298fc089b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2284 1824 1005bd1d763db09f6780f5d298fc089b.exe 92 PID 1824 wrote to memory of 2284 1824 1005bd1d763db09f6780f5d298fc089b.exe 92 PID 1824 wrote to memory of 2284 1824 1005bd1d763db09f6780f5d298fc089b.exe 92 PID 2284 wrote to memory of 1456 2284 1005bd1d763db09f6780f5d298fc089b.exe 94 PID 2284 wrote to memory of 1456 2284 1005bd1d763db09f6780f5d298fc089b.exe 94 PID 2284 wrote to memory of 1456 2284 1005bd1d763db09f6780f5d298fc089b.exe 94 PID 2284 wrote to memory of 1456 2284 1005bd1d763db09f6780f5d298fc089b.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1005bd1d763db09f6780f5d298fc089b.exe"C:\Users\Admin\AppData\Local\Temp\1005bd1d763db09f6780f5d298fc089b.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
\??\c:\users\admin\appdata\local\temp\1005bd1d763db09f6780f5d298fc089b.exec:\users\admin\appdata\local\temp\1005bd1d763db09f6780f5d298fc089b.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Sets service image path in registry
- Deletes itself
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 3444⤵
- Program crash
PID:4740
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1456 -ip 14561⤵PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD51005bd1d763db09f6780f5d298fc089b
SHA1f49b38004fbef779fe6b1bb28d74bc02a664a3fe
SHA2565a907c82c953724497b8c703c14051f2dcc2002192e18715f9f10e18862eda8b
SHA512e68b7b3999378d278ae57aad57c47d089a4c486717247e6e97bee9b19878a4f686eebe13121dd4213c5033088c2f968610cf2c4e985e09e0c79ea3e50c59131f