Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:17
Static task
static1
Behavioral task
behavioral1
Sample
29aef50c7a013e99270130d047aeed15.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29aef50c7a013e99270130d047aeed15.exe
Resource
win10v2004-20231215-en
General
-
Target
29aef50c7a013e99270130d047aeed15.exe
-
Size
23KB
-
MD5
29aef50c7a013e99270130d047aeed15
-
SHA1
c2aa9911c1cff4bfda04d14dca4f5f295338e7eb
-
SHA256
e01ba8e88199648c7e2b9636cdc1398a9255296af400ec4c64b5eaf7799345e4
-
SHA512
4600d068b5c5a312b8710b9f89540398bfce59af16bab72dd2de553775e9ade0491ca269282a89191a011d08dab2821af572eb0fd9d690b2abb875b397123a15
-
SSDEEP
384:dBVu3GxsR8eDfbTESC+5ia02v4L0zeG52TkPn+Vsg:dBVtc5DyS7Nvi0zyM+p
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3920 iswrd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\iswrd.exe 29aef50c7a013e99270130d047aeed15.exe File opened for modification C:\Windows\SysWOW64\iswrd.exe 29aef50c7a013e99270130d047aeed15.exe -
Kills process with taskkill 8 IoCs
pid Process 4308 taskkill.exe 4552 taskkill.exe 5020 taskkill.exe 4008 taskkill.exe 4352 taskkill.exe 3604 taskkill.exe 4300 taskkill.exe 4576 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3872 29aef50c7a013e99270130d047aeed15.exe 3872 29aef50c7a013e99270130d047aeed15.exe 3872 29aef50c7a013e99270130d047aeed15.exe 3872 29aef50c7a013e99270130d047aeed15.exe 3920 iswrd.exe 3920 iswrd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3872 29aef50c7a013e99270130d047aeed15.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3872 wrote to memory of 1112 3872 29aef50c7a013e99270130d047aeed15.exe 46 PID 3872 wrote to memory of 1112 3872 29aef50c7a013e99270130d047aeed15.exe 46 PID 3872 wrote to memory of 1112 3872 29aef50c7a013e99270130d047aeed15.exe 46 PID 3872 wrote to memory of 3780 3872 29aef50c7a013e99270130d047aeed15.exe 45 PID 3872 wrote to memory of 3780 3872 29aef50c7a013e99270130d047aeed15.exe 45 PID 3872 wrote to memory of 3780 3872 29aef50c7a013e99270130d047aeed15.exe 45 PID 3872 wrote to memory of 1532 3872 29aef50c7a013e99270130d047aeed15.exe 44 PID 3872 wrote to memory of 1532 3872 29aef50c7a013e99270130d047aeed15.exe 44 PID 3872 wrote to memory of 1532 3872 29aef50c7a013e99270130d047aeed15.exe 44 PID 3872 wrote to memory of 1644 3872 29aef50c7a013e99270130d047aeed15.exe 43 PID 3872 wrote to memory of 1644 3872 29aef50c7a013e99270130d047aeed15.exe 43 PID 3872 wrote to memory of 1644 3872 29aef50c7a013e99270130d047aeed15.exe 43 PID 3920 wrote to memory of 4364 3920 iswrd.exe 38 PID 3920 wrote to memory of 4364 3920 iswrd.exe 38 PID 3920 wrote to memory of 4364 3920 iswrd.exe 38 PID 3920 wrote to memory of 2832 3920 iswrd.exe 37 PID 3920 wrote to memory of 2832 3920 iswrd.exe 37 PID 3920 wrote to memory of 2832 3920 iswrd.exe 37 PID 3920 wrote to memory of 4944 3920 iswrd.exe 35 PID 3920 wrote to memory of 4944 3920 iswrd.exe 35 PID 3920 wrote to memory of 4944 3920 iswrd.exe 35 PID 3920 wrote to memory of 1944 3920 iswrd.exe 34 PID 3920 wrote to memory of 1944 3920 iswrd.exe 34 PID 3920 wrote to memory of 1944 3920 iswrd.exe 34 PID 3872 wrote to memory of 2992 3872 29aef50c7a013e99270130d047aeed15.exe 33 PID 3872 wrote to memory of 2992 3872 29aef50c7a013e99270130d047aeed15.exe 33 PID 3872 wrote to memory of 2992 3872 29aef50c7a013e99270130d047aeed15.exe 33 PID 1112 wrote to memory of 4300 1112 cmd.exe 31 PID 1112 wrote to memory of 4300 1112 cmd.exe 31 PID 1112 wrote to memory of 4300 1112 cmd.exe 31 PID 3780 wrote to memory of 4352 3780 cmd.exe 29 PID 3780 wrote to memory of 4352 3780 cmd.exe 29 PID 3780 wrote to memory of 4352 3780 cmd.exe 29 PID 1944 wrote to memory of 3604 1944 cmd.exe 30 PID 1944 wrote to memory of 3604 1944 cmd.exe 30 PID 1944 wrote to memory of 3604 1944 cmd.exe 30 PID 1532 wrote to memory of 4008 1532 cmd.exe 28 PID 1532 wrote to memory of 4008 1532 cmd.exe 28 PID 1532 wrote to memory of 4008 1532 cmd.exe 28 PID 4944 wrote to memory of 5020 4944 Process not Found 27 PID 4944 wrote to memory of 5020 4944 Process not Found 27 PID 4944 wrote to memory of 5020 4944 Process not Found 27 PID 2832 wrote to memory of 4552 2832 Process not Found 26 PID 2832 wrote to memory of 4552 2832 Process not Found 26 PID 2832 wrote to memory of 4552 2832 Process not Found 26 PID 1644 wrote to memory of 4576 1644 cmd.exe 20 PID 1644 wrote to memory of 4576 1644 cmd.exe 20 PID 1644 wrote to memory of 4576 1644 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\29aef50c7a013e99270130d047aeed15.exe"C:\Users\Admin\AppData\Local\Temp\29aef50c7a013e99270130d047aeed15.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\29AEF5~1.EXE > nul2⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwproxy.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1644
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwstub.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1532
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwsrv.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3780
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwmain.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwproxy.exe1⤵
- Kills process with taskkill
PID:4576
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwmain.exe1⤵
- Kills process with taskkill
PID:4308
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwsrv.exe1⤵
- Kills process with taskkill
PID:4552
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwstub.exe1⤵
- Kills process with taskkill
PID:5020
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwstub.exe1⤵
- Kills process with taskkill
PID:4008
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwsrv.exe1⤵
- Kills process with taskkill
PID:4352
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwproxy.exe1⤵
- Kills process with taskkill
PID:3604
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwmain.exe1⤵
- Kills process with taskkill
PID:4300
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwproxy.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1944
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwstub.exe1⤵PID:4944
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwsrv.exe1⤵PID:2832
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwmain.exe1⤵PID:4364
-
C:\Windows\SysWOW64\iswrd.exeC:\Windows\SysWOW64\iswrd.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3920
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD529aef50c7a013e99270130d047aeed15
SHA1c2aa9911c1cff4bfda04d14dca4f5f295338e7eb
SHA256e01ba8e88199648c7e2b9636cdc1398a9255296af400ec4c64b5eaf7799345e4
SHA5124600d068b5c5a312b8710b9f89540398bfce59af16bab72dd2de553775e9ade0491ca269282a89191a011d08dab2821af572eb0fd9d690b2abb875b397123a15