Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 12:57
Behavioral task
behavioral1
Sample
193a2f1f586f5966a670c0cebdcd767a.exe
Resource
win7-20231215-en
windows7-x64
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
193a2f1f586f5966a670c0cebdcd767a.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
193a2f1f586f5966a670c0cebdcd767a.exe
-
Size
510KB
-
MD5
193a2f1f586f5966a670c0cebdcd767a
-
SHA1
80747541e667065c5224e45858147b9491af5106
-
SHA256
d5eb64a4299bc489d0e73aa95dd4bab67212169e1868137cba6654171f58f9fd
-
SHA512
9e7f7e7b33fc5784be755874324344e45a05a85300c81f77ac881b9f526b436c847a8928e33d4ec2259d8c9e7254ac83fe24bd0405f37d4c3eaa3a2d6390f996
-
SSDEEP
12288:qsMxi+i/NBzYLJpjJICcfkmOjuXCjhpehUNtTird:qsMxwNBkOf6jyIehETEd
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" 193a2f1f586f5966a670c0cebdcd767a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 193a2f1f586f5966a670c0cebdcd767a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" 193a2f1f586f5966a670c0cebdcd767a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} 193a2f1f586f5966a670c0cebdcd767a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ 193a2f1f586f5966a670c0cebdcd767a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" 193a2f1f586f5966a670c0cebdcd767a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe -
Executes dropped EXE 2 IoCs
pid Process 4368 fservice.exe 1856 services.exe -
Loads dropped DLL 5 IoCs
pid Process 1856 services.exe 1856 services.exe 1856 services.exe 4368 fservice.exe 3448 193a2f1f586f5966a670c0cebdcd767a.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ 193a2f1f586f5966a670c0cebdcd767a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\fservice.exe fservice.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\reginv.dll services.exe File created C:\Windows\SysWOW64\fservice.exe services.exe File created C:\Windows\SysWOW64\fservice.exe 193a2f1f586f5966a670c0cebdcd767a.exe File opened for modification C:\Windows\SysWOW64\fservice.exe 193a2f1f586f5966a670c0cebdcd767a.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe 193a2f1f586f5966a670c0cebdcd767a.exe File opened for modification C:\Windows\system\sservice.exe 193a2f1f586f5966a670c0cebdcd767a.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe 1856 services.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1856 services.exe 1856 services.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3448 wrote to memory of 4368 3448 193a2f1f586f5966a670c0cebdcd767a.exe 28 PID 3448 wrote to memory of 4368 3448 193a2f1f586f5966a670c0cebdcd767a.exe 28 PID 3448 wrote to memory of 4368 3448 193a2f1f586f5966a670c0cebdcd767a.exe 28 PID 4368 wrote to memory of 1856 4368 fservice.exe 27 PID 4368 wrote to memory of 1856 4368 fservice.exe 27 PID 4368 wrote to memory of 1856 4368 fservice.exe 27 PID 1856 wrote to memory of 2172 1856 services.exe 26 PID 1856 wrote to memory of 2172 1856 services.exe 26 PID 1856 wrote to memory of 2172 1856 services.exe 26 PID 1856 wrote to memory of 968 1856 services.exe 25 PID 1856 wrote to memory of 968 1856 services.exe 25 PID 1856 wrote to memory of 968 1856 services.exe 25 PID 968 wrote to memory of 4276 968 NET.exe 23 PID 968 wrote to memory of 4276 968 NET.exe 23 PID 968 wrote to memory of 4276 968 NET.exe 23 PID 2172 wrote to memory of 4856 2172 NET.exe 21 PID 2172 wrote to memory of 4856 2172 NET.exe 21 PID 2172 wrote to memory of 4856 2172 NET.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\193a2f1f586f5966a670c0cebdcd767a.exe"C:\Users\Admin\AppData\Local\Temp\193a2f1f586f5966a670c0cebdcd767a.exe"1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4368
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice1⤵PID:4856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc1⤵PID:4276
-
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc1⤵
- Suspicious use of WriteProcessMemory
PID:968
-
C:\Windows\SysWOW64\NET.exeNET STOP srservice1⤵
- Suspicious use of WriteProcessMemory
PID:2172
-
C:\Windows\services.exeC:\Windows\services.exe -XP1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856