Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
27279fef7becb54fd327f2adba9c500a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
27279fef7becb54fd327f2adba9c500a.exe
Resource
win10v2004-20231215-en
General
-
Target
27279fef7becb54fd327f2adba9c500a.exe
-
Size
39KB
-
MD5
27279fef7becb54fd327f2adba9c500a
-
SHA1
1b9cb10413b78c4a511c52a71f0b09d494c30b9b
-
SHA256
6e09b62d4feb68bd347e66b903503958bfb69c5d8f6408d7fe7546cd39ae191d
-
SHA512
fba971ad288af277be1d7b5b7a0ac112d76ea03f0f73a6a915761aa54236c92f7db2cb5a3b5b12264c353cdbeec53db30bf068ef1bbb76765392263fa947023d
-
SSDEEP
768:XXmmIlfh2z4MMDa0DUM/YytkxfJCbeT2zDGgRd6+2v2X6MQw/jUg:nmmIZhtblxtSfenDGo4+FXHQMR
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" 27279fef7becb54fd327f2adba9c500a.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 27279fef7becb54fd327f2adba9c500a.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 symldvc.exe -
Loads dropped DLL 3 IoCs
pid Process 880 27279fef7becb54fd327f2adba9c500a.exe 880 27279fef7becb54fd327f2adba9c500a.exe 2572 symldvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Device Config = "symldvc.exe" 27279fef7becb54fd327f2adba9c500a.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\symldvc.exe 27279fef7becb54fd327f2adba9c500a.exe File opened for modification C:\Windows\SysWOW64\symldvc.exe 27279fef7becb54fd327f2adba9c500a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2872 set thread context of 880 2872 27279fef7becb54fd327f2adba9c500a.exe 23 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 880 27279fef7becb54fd327f2adba9c500a.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2872 wrote to memory of 880 2872 27279fef7becb54fd327f2adba9c500a.exe 23 PID 2872 wrote to memory of 880 2872 27279fef7becb54fd327f2adba9c500a.exe 23 PID 2872 wrote to memory of 880 2872 27279fef7becb54fd327f2adba9c500a.exe 23 PID 2872 wrote to memory of 880 2872 27279fef7becb54fd327f2adba9c500a.exe 23 PID 2872 wrote to memory of 880 2872 27279fef7becb54fd327f2adba9c500a.exe 23 PID 2872 wrote to memory of 880 2872 27279fef7becb54fd327f2adba9c500a.exe 23 PID 2872 wrote to memory of 880 2872 27279fef7becb54fd327f2adba9c500a.exe 23 PID 2872 wrote to memory of 880 2872 27279fef7becb54fd327f2adba9c500a.exe 23 PID 2872 wrote to memory of 880 2872 27279fef7becb54fd327f2adba9c500a.exe 23 PID 880 wrote to memory of 2572 880 27279fef7becb54fd327f2adba9c500a.exe 29 PID 880 wrote to memory of 2572 880 27279fef7becb54fd327f2adba9c500a.exe 29 PID 880 wrote to memory of 2572 880 27279fef7becb54fd327f2adba9c500a.exe 29 PID 880 wrote to memory of 2572 880 27279fef7becb54fd327f2adba9c500a.exe 29 PID 880 wrote to memory of 2680 880 27279fef7becb54fd327f2adba9c500a.exe 30 PID 880 wrote to memory of 2680 880 27279fef7becb54fd327f2adba9c500a.exe 30 PID 880 wrote to memory of 2680 880 27279fef7becb54fd327f2adba9c500a.exe 30 PID 880 wrote to memory of 2680 880 27279fef7becb54fd327f2adba9c500a.exe 30 PID 880 wrote to memory of 2688 880 27279fef7becb54fd327f2adba9c500a.exe 37 PID 880 wrote to memory of 2688 880 27279fef7becb54fd327f2adba9c500a.exe 37 PID 880 wrote to memory of 2688 880 27279fef7becb54fd327f2adba9c500a.exe 37 PID 880 wrote to memory of 2688 880 27279fef7becb54fd327f2adba9c500a.exe 37 PID 880 wrote to memory of 2664 880 27279fef7becb54fd327f2adba9c500a.exe 36 PID 880 wrote to memory of 2664 880 27279fef7becb54fd327f2adba9c500a.exe 36 PID 880 wrote to memory of 2664 880 27279fef7becb54fd327f2adba9c500a.exe 36 PID 880 wrote to memory of 2664 880 27279fef7becb54fd327f2adba9c500a.exe 36 PID 2572 wrote to memory of 2692 2572 symldvc.exe 31 PID 2572 wrote to memory of 2692 2572 symldvc.exe 31 PID 2572 wrote to memory of 2692 2572 symldvc.exe 31 PID 2572 wrote to memory of 2692 2572 symldvc.exe 31 PID 880 wrote to memory of 2720 880 27279fef7becb54fd327f2adba9c500a.exe 35 PID 880 wrote to memory of 2720 880 27279fef7becb54fd327f2adba9c500a.exe 35 PID 880 wrote to memory of 2720 880 27279fef7becb54fd327f2adba9c500a.exe 35 PID 880 wrote to memory of 2720 880 27279fef7becb54fd327f2adba9c500a.exe 35 PID 880 wrote to memory of 2880 880 27279fef7becb54fd327f2adba9c500a.exe 39 PID 880 wrote to memory of 2880 880 27279fef7becb54fd327f2adba9c500a.exe 39 PID 880 wrote to memory of 2880 880 27279fef7becb54fd327f2adba9c500a.exe 39 PID 880 wrote to memory of 2880 880 27279fef7becb54fd327f2adba9c500a.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\27279fef7becb54fd327f2adba9c500a.exe"C:\Users\Admin\AppData\Local\Temp\27279fef7becb54fd327f2adba9c500a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\27279fef7becb54fd327f2adba9c500a.exe"C:\Users\Admin\AppData\Local\Temp\27279fef7becb54fd327f2adba9c500a.exe"2⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\symldvc.exe"C:\Windows\system32\symldvc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\symldvc.exe"C:\Windows\SysWOW64\symldvc.exe"4⤵PID:2692
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:2680
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:2720
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:2664
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:2688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\27279F~1.EXE > nul3⤵PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD527279fef7becb54fd327f2adba9c500a
SHA11b9cb10413b78c4a511c52a71f0b09d494c30b9b
SHA2566e09b62d4feb68bd347e66b903503958bfb69c5d8f6408d7fe7546cd39ae191d
SHA512fba971ad288af277be1d7b5b7a0ac112d76ea03f0f73a6a915761aa54236c92f7db2cb5a3b5b12264c353cdbeec53db30bf068ef1bbb76765392263fa947023d