Analysis
-
max time kernel
0s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 07:02
Static task
static1
Behavioral task
behavioral1
Sample
2c9b02f70f403a77bf8bc134847eeaf5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c9b02f70f403a77bf8bc134847eeaf5.exe
Resource
win10v2004-20231215-en
General
-
Target
2c9b02f70f403a77bf8bc134847eeaf5.exe
-
Size
3.7MB
-
MD5
2c9b02f70f403a77bf8bc134847eeaf5
-
SHA1
aae89f708e380c270c0495491ab10e696920d5d8
-
SHA256
eb4f5975f3707dd4747816a1df8ae426c53fa74ff5655fb735f65eac77312193
-
SHA512
5a987dc54c1c4233f2fbe86feb0b8c926b3a72a162675600b34706bd995d0b4178d6035e001b253366f981feb6909f7c190e3f0568eb46f12c056093338d938f
-
SSDEEP
98304:lWZ+WFlt0g9nfsTDTTa2zMiA4dHjrmtsxw9nn:luDj0g96nNzMiA4hmOw9n
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2640 netsh.exe -
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows32 = "C:\\windows\\system\\system.exe" 2c9b02f70f403a77bf8bc134847eeaf5.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\autoconvv.RRI 2c9b02f70f403a77bf8bc134847eeaf5.exe File opened for modification \??\c:\windows\SysWOW64\autoconvv.RRI 2c9b02f70f403a77bf8bc134847eeaf5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\system32AntiDelete 2c9b02f70f403a77bf8bc134847eeaf5.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3040 sc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3040 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 24 PID 2404 wrote to memory of 3040 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 24 PID 2404 wrote to memory of 3040 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 24 PID 2404 wrote to memory of 3040 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 24 PID 2404 wrote to memory of 2860 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 23 PID 2404 wrote to memory of 2860 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 23 PID 2404 wrote to memory of 2860 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 23 PID 2404 wrote to memory of 2860 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 23 PID 2404 wrote to memory of 2720 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 21 PID 2404 wrote to memory of 2720 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 21 PID 2404 wrote to memory of 2720 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 21 PID 2404 wrote to memory of 2720 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 21 PID 2404 wrote to memory of 2756 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 15 PID 2404 wrote to memory of 2756 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 15 PID 2404 wrote to memory of 2756 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 15 PID 2404 wrote to memory of 2756 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 15 PID 2404 wrote to memory of 2640 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 18 PID 2404 wrote to memory of 2640 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 18 PID 2404 wrote to memory of 2640 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 18 PID 2404 wrote to memory of 2640 2404 2c9b02f70f403a77bf8bc134847eeaf5.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c9b02f70f403a77bf8bc134847eeaf5.exe"C:\Users\Admin\AppData\Local\Temp\2c9b02f70f403a77bf8bc134847eeaf5.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2756
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\windows\system\system.exe RPCCC2⤵
- Modifies Windows Firewall
PID:2640
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2720
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2860
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2