Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:02
Static task
static1
Behavioral task
behavioral1
Sample
20f23133004922fdeccdf1b9a4f69ed5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20f23133004922fdeccdf1b9a4f69ed5.exe
Resource
win10v2004-20231215-en
General
-
Target
20f23133004922fdeccdf1b9a4f69ed5.exe
-
Size
1.4MB
-
MD5
20f23133004922fdeccdf1b9a4f69ed5
-
SHA1
fdb6b6859e8b13fcee4053a0f4d28b6aebe72e2a
-
SHA256
5bfc6e6261495a8e4a968fc0170181b723e3647d7e43e6ba74e3572bd7f76f1c
-
SHA512
90ba71d5c5e8455f06a79222468de82712c1e752b3a6925f18aae49d6a71f3d8a1fd3b0ad0c9d564ec8597c634da541e8dd8950e33c63590bec0772e0a5b025c
-
SSDEEP
3072:8MBwCbm8zxdAgDADIgBnsTaNkayQ9BKJR:8MB/m8zDAFIuk
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Universal System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\20f23133004922fdeccdf1b9a4f69ed5.exe" 20f23133004922fdeccdf1b9a4f69ed5.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\upjus.dll 20f23133004922fdeccdf1b9a4f69ed5.exe -
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar 20f23133004922fdeccdf1b9a4f69ed5.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 2400 20f23133004922fdeccdf1b9a4f69ed5.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2360 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 22 PID 2400 wrote to memory of 2360 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 22 PID 2400 wrote to memory of 2360 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 22 PID 2400 wrote to memory of 1620 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 40 PID 2400 wrote to memory of 1620 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 40 PID 2400 wrote to memory of 1620 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 40 PID 2400 wrote to memory of 1380 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 39 PID 2400 wrote to memory of 1380 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 39 PID 2400 wrote to memory of 1380 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 39 PID 2400 wrote to memory of 2028 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 38 PID 2400 wrote to memory of 2028 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 38 PID 2400 wrote to memory of 2028 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 38 PID 2400 wrote to memory of 1768 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 37 PID 2400 wrote to memory of 1768 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 37 PID 2400 wrote to memory of 1768 2400 20f23133004922fdeccdf1b9a4f69ed5.exe 37 PID 1620 wrote to memory of 3112 1620 cmd.exe 26 PID 1620 wrote to memory of 3112 1620 cmd.exe 26 PID 1620 wrote to memory of 3112 1620 cmd.exe 26 PID 2360 wrote to memory of 2968 2360 cmd.exe 33 PID 2360 wrote to memory of 2968 2360 cmd.exe 33 PID 2360 wrote to memory of 2968 2360 cmd.exe 33 PID 3112 wrote to memory of 4396 3112 net.exe 32 PID 3112 wrote to memory of 4396 3112 net.exe 32 PID 3112 wrote to memory of 4396 3112 net.exe 32 PID 2968 wrote to memory of 3940 2968 net.exe 31 PID 2968 wrote to memory of 3940 2968 net.exe 31 PID 2968 wrote to memory of 3940 2968 net.exe 31 PID 2028 wrote to memory of 5012 2028 cmd.exe 30 PID 2028 wrote to memory of 5012 2028 cmd.exe 30 PID 2028 wrote to memory of 5012 2028 cmd.exe 30 PID 1768 wrote to memory of 3468 1768 cmd.exe 29 PID 1768 wrote to memory of 3468 1768 cmd.exe 29 PID 1768 wrote to memory of 3468 1768 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\20f23133004922fdeccdf1b9a4f69ed5.exe"C:\Users\Admin\AppData\Local\Temp\20f23133004922fdeccdf1b9a4f69ed5.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"3⤵
- Suspicious use of WriteProcessMemory
PID:2968
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 0x4 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1768
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /v Start /t REG_DWORD /d 0x4 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2028
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess" /v Start /t REG_DWORD /d 0x4 /f2⤵PID:1380
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:1620
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess1⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess2⤵PID:4396
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 0x4 /f1⤵
- Modifies security service
PID:3468
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /v Start /t REG_DWORD /d 0x4 /f1⤵
- Modifies security service
PID:5012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"1⤵PID:3940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1