Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:57
Behavioral task
behavioral1
Sample
193a2f1f586f5966a670c0cebdcd767a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
193a2f1f586f5966a670c0cebdcd767a.exe
Resource
win10v2004-20231215-en
General
-
Target
193a2f1f586f5966a670c0cebdcd767a.exe
-
Size
510KB
-
MD5
193a2f1f586f5966a670c0cebdcd767a
-
SHA1
80747541e667065c5224e45858147b9491af5106
-
SHA256
d5eb64a4299bc489d0e73aa95dd4bab67212169e1868137cba6654171f58f9fd
-
SHA512
9e7f7e7b33fc5784be755874324344e45a05a85300c81f77ac881b9f526b436c847a8928e33d4ec2259d8c9e7254ac83fe24bd0405f37d4c3eaa3a2d6390f996
-
SSDEEP
12288:qsMxi+i/NBzYLJpjJICcfkmOjuXCjhpehUNtTird:qsMxwNBkOf6jyIehETEd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" 193a2f1f586f5966a670c0cebdcd767a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 193a2f1f586f5966a670c0cebdcd767a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" 193a2f1f586f5966a670c0cebdcd767a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} 193a2f1f586f5966a670c0cebdcd767a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ 193a2f1f586f5966a670c0cebdcd767a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" 193a2f1f586f5966a670c0cebdcd767a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe -
Executes dropped EXE 2 IoCs
pid Process 2556 fservice.exe 2908 services.exe -
Loads dropped DLL 6 IoCs
pid Process 1080 193a2f1f586f5966a670c0cebdcd767a.exe 1080 193a2f1f586f5966a670c0cebdcd767a.exe 2908 services.exe 2908 services.exe 2556 fservice.exe 1080 193a2f1f586f5966a670c0cebdcd767a.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ 193a2f1f586f5966a670c0cebdcd767a.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 193a2f1f586f5966a670c0cebdcd767a.exe File opened for modification \??\PhysicalDrive0 fservice.exe File opened for modification \??\PhysicalDrive0 services.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\fservice.exe 193a2f1f586f5966a670c0cebdcd767a.exe File opened for modification C:\Windows\SysWOW64\fservice.exe 193a2f1f586f5966a670c0cebdcd767a.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\reginv.dll services.exe File created C:\Windows\SysWOW64\fservice.exe services.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe 193a2f1f586f5966a670c0cebdcd767a.exe File opened for modification C:\Windows\system\sservice.exe 193a2f1f586f5966a670c0cebdcd767a.exe File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe 2908 services.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2908 services.exe 2908 services.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2556 1080 193a2f1f586f5966a670c0cebdcd767a.exe 29 PID 1080 wrote to memory of 2556 1080 193a2f1f586f5966a670c0cebdcd767a.exe 29 PID 1080 wrote to memory of 2556 1080 193a2f1f586f5966a670c0cebdcd767a.exe 29 PID 1080 wrote to memory of 2556 1080 193a2f1f586f5966a670c0cebdcd767a.exe 29 PID 2556 wrote to memory of 2908 2556 fservice.exe 28 PID 2556 wrote to memory of 2908 2556 fservice.exe 28 PID 2556 wrote to memory of 2908 2556 fservice.exe 28 PID 2556 wrote to memory of 2908 2556 fservice.exe 28 PID 2908 wrote to memory of 1404 2908 services.exe 35 PID 2908 wrote to memory of 1404 2908 services.exe 35 PID 2908 wrote to memory of 1404 2908 services.exe 35 PID 2908 wrote to memory of 1404 2908 services.exe 35 PID 2908 wrote to memory of 1412 2908 services.exe 30 PID 2908 wrote to memory of 1412 2908 services.exe 30 PID 2908 wrote to memory of 1412 2908 services.exe 30 PID 2908 wrote to memory of 1412 2908 services.exe 30 PID 1404 wrote to memory of 2084 1404 NET.exe 33 PID 1404 wrote to memory of 2084 1404 NET.exe 33 PID 1404 wrote to memory of 2084 1404 NET.exe 33 PID 1404 wrote to memory of 2084 1404 NET.exe 33 PID 1412 wrote to memory of 1708 1412 NET.exe 32 PID 1412 wrote to memory of 1708 1412 NET.exe 32 PID 1412 wrote to memory of 1708 1412 NET.exe 32 PID 1412 wrote to memory of 1708 1412 NET.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\193a2f1f586f5966a670c0cebdcd767a.exe"C:\Users\Admin\AppData\Local\Temp\193a2f1f586f5966a670c0cebdcd767a.exe"1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Modifies WinLogon
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2556
-
-
C:\Windows\services.exeC:\Windows\services.exe -XP1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc3⤵PID:1708
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP srservice2⤵
- Suspicious use of WriteProcessMemory
PID:1404
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Pre-OS Boot
1Bootkit
1