Analysis
-
max time kernel
60s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
125db40e2dd5b4b217422327ac449c25.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
125db40e2dd5b4b217422327ac449c25.exe
Resource
win10v2004-20231215-en
General
-
Target
125db40e2dd5b4b217422327ac449c25.exe
-
Size
1.8MB
-
MD5
125db40e2dd5b4b217422327ac449c25
-
SHA1
a5460d1ed787288689afbf64a1ff3d3f6cc769b6
-
SHA256
b7f9c8c589b7429a6d692a6b7be281d9efe8a17973e6486baa8efd96f7e7f9cf
-
SHA512
188d9744f8844ebc5e806e018f48a55b273844ae5c3d4980c9f067cf06471705f02b18c61afe3112e7a4dbee38dbfb186d2e51a10968a63eaada23019d622ee7
-
SSDEEP
24576:GG/oDTSIDDO5uiSyTp+Ddbgo9RALPODNIYZpeuwV0344vzFtRL5Yt/3vDvMA+XJ+:f2S/HhouOJZpev03LjktjGtb25nQiCW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" 125db40e2dd5b4b217422327ac449c25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 125db40e2dd5b4b217422327ac449c25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" 125db40e2dd5b4b217422327ac449c25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} 125db40e2dd5b4b217422327ac449c25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ 125db40e2dd5b4b217422327ac449c25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" 125db40e2dd5b4b217422327ac449c25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe -
resource yara_rule behavioral1/files/0x00070000000186bd-79.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 2572 fservice.exe 440 services.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Wine 125db40e2dd5b4b217422327ac449c25.exe Key opened \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Wine fservice.exe Key opened \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Wine services.exe -
Loads dropped DLL 6 IoCs
pid Process 2060 125db40e2dd5b4b217422327ac449c25.exe 2060 125db40e2dd5b4b217422327ac449c25.exe 440 services.exe 440 services.exe 2572 fservice.exe 2060 125db40e2dd5b4b217422327ac449c25.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ 125db40e2dd5b4b217422327ac449c25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\fservice.exe services.exe File created C:\Windows\SysWOW64\fservice.exe 125db40e2dd5b4b217422327ac449c25.exe File opened for modification C:\Windows\SysWOW64\fservice.exe 125db40e2dd5b4b217422327ac449c25.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\reginv.dll services.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe File opened for modification C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe 125db40e2dd5b4b217422327ac449c25.exe File opened for modification C:\Windows\system\sservice.exe 125db40e2dd5b4b217422327ac449c25.exe File created C:\Windows\services.exe fservice.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2060 125db40e2dd5b4b217422327ac449c25.exe 2572 fservice.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe 440 services.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 440 services.exe 440 services.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2572 2060 125db40e2dd5b4b217422327ac449c25.exe 28 PID 2060 wrote to memory of 2572 2060 125db40e2dd5b4b217422327ac449c25.exe 28 PID 2060 wrote to memory of 2572 2060 125db40e2dd5b4b217422327ac449c25.exe 28 PID 2060 wrote to memory of 2572 2060 125db40e2dd5b4b217422327ac449c25.exe 28 PID 2572 wrote to memory of 440 2572 fservice.exe 29 PID 2572 wrote to memory of 440 2572 fservice.exe 29 PID 2572 wrote to memory of 440 2572 fservice.exe 29 PID 2572 wrote to memory of 440 2572 fservice.exe 29 PID 440 wrote to memory of 2976 440 services.exe 35 PID 440 wrote to memory of 2976 440 services.exe 35 PID 440 wrote to memory of 2976 440 services.exe 35 PID 440 wrote to memory of 2976 440 services.exe 35 PID 440 wrote to memory of 3008 440 services.exe 34 PID 440 wrote to memory of 3008 440 services.exe 34 PID 440 wrote to memory of 3008 440 services.exe 34 PID 440 wrote to memory of 3008 440 services.exe 34 PID 2976 wrote to memory of 1540 2976 NET.exe 32 PID 2976 wrote to memory of 1540 2976 NET.exe 32 PID 2976 wrote to memory of 1540 2976 NET.exe 32 PID 2976 wrote to memory of 1540 2976 NET.exe 32 PID 3008 wrote to memory of 1696 3008 NET.exe 31 PID 3008 wrote to memory of 1696 3008 NET.exe 31 PID 3008 wrote to memory of 1696 3008 NET.exe 31 PID 3008 wrote to memory of 1696 3008 NET.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\125db40e2dd5b4b217422327ac449c25.exe"C:\Users\Admin\AppData\Local\Temp\125db40e2dd5b4b217422327ac449c25.exe"1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\services.exeC:\Windows\services.exe -XP3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc4⤵
- Suspicious use of WriteProcessMemory
PID:3008
-
-
C:\Windows\SysWOW64\NET.exeNET STOP srservice4⤵
- Suspicious use of WriteProcessMemory
PID:2976
-
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc1⤵PID:1696
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice1⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5c32f2df6ea19e1e290fb0a56e79e41b8
SHA1a10063cc554f81e4c7a0494ad3f30f4b1d29cc12
SHA256af681bba364575b65cab0313e0774c76e1ef52d6a581951eb1ada5594c2cc650
SHA512d8f8a0a966609a473cbee665becee3e126121a56ebe437deb266636b94ef7fa19b6a0629a5b72077445bc7d80dd4e4d8e01044b67ec72004e81b42dd3c0740b9
-
Filesize
45KB
MD54ae49ba0260061ee64beeeb9357447f5
SHA147cfc3620103652678c25b7d2ea7dbcf67b82308
SHA256499088e6ab847f26f16746756ad952d0c3209a2bfa2385f46ece364f20af4132
SHA51242fcb8116c1f2fd7073873e6227c0131ed23b9b9e17d0eb1f5e8babc55f3b553ab996e61e0129955231459b99734611d6aed256ec286319105cd0edef901c1f2
-
Filesize
293KB
MD59bf1ad821b607a6923fa334392c59f5d
SHA1d10f52067b2b62c2e08f8c04487b10ed74d04b2c
SHA256011f92a399cb37900e982499b1948db68131a68e6774b86e8925d3195f4c53be
SHA512d2e39415c1007c3c873feea04f143c2a3253f3adee6665ab6eea246ead07f7aaa132377ee351d3998fe5fc870d510920175374e85f216355a36805575c662e7f
-
Filesize
20KB
MD5efe1a51eac2e377a23fc11edf9be91d6
SHA11576d771c4caf4a04b25929fa0f0b06dadc87511
SHA2563320ef352ba97cc4632de11585ac1657e3b279d481465a04656dd230fe65deb5
SHA512c8926141178eac63dda8258d71e4d534d0dcb21d9a94d7ab89b3241caa5e25740c845f420d74cfdabc5606296e9c59a75cc74e84005e4dc27dfbe098ea78d6b4
-
Filesize
13KB
MD536234e0b8df76ea2c282bba1a1b45748
SHA134880e089a5d5c42bce1622195522b431668206f
SHA256d610cecdc353cb4a26e7d158c7ea0f78b573b57f9ac8ffc20832f89a7eac5ada
SHA512cecae4a3e3c890078c01764903da6495d38eb8bcbe689b54607fe4d2029853752187d174690218041b6f0059749bb6ab344e751436c9b8d675e3ee19eced9222