Analysis
-
max time kernel
150s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:04
Behavioral task
behavioral1
Sample
2ca5fe9aa030e7487619f3d5c15b70ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2ca5fe9aa030e7487619f3d5c15b70ad.exe
Resource
win10v2004-20231215-en
General
-
Target
2ca5fe9aa030e7487619f3d5c15b70ad.exe
-
Size
28KB
-
MD5
2ca5fe9aa030e7487619f3d5c15b70ad
-
SHA1
3c7849013a40537140aeb964cc3a85bbe807b2b0
-
SHA256
8845916a98575b683ef72f70305a550b367c70416f91866298f34027f958c965
-
SHA512
47cacdcd63846890928541ea279895829091082371929b88cc282ad5783749214ffdc8cdcdda0a0fb4a3f62a8f26cb76cc56d0ba86d1ff76e50f9679457a5e2e
-
SSDEEP
768:ZYNwKY/6Asd/t3CfmE55WmRWTZnttRBwroze:ZYNY/Ad/t3VEDbRWTZnTHRe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1764 svcmrgb.exe -
resource yara_rule behavioral2/memory/4832-0-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4832-1-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/files/0x000200000001e7e8-3.dat upx behavioral2/memory/4832-5-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1764-6-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\svcmrgb.exe 2ca5fe9aa030e7487619f3d5c15b70ad.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svcmrgb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svcmrgb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svcmrgb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svcmrgb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svcmrgb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4832 2ca5fe9aa030e7487619f3d5c15b70ad.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4832 2ca5fe9aa030e7487619f3d5c15b70ad.exe 4832 2ca5fe9aa030e7487619f3d5c15b70ad.exe 1764 svcmrgb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4072 4832 2ca5fe9aa030e7487619f3d5c15b70ad.exe 94 PID 4832 wrote to memory of 4072 4832 2ca5fe9aa030e7487619f3d5c15b70ad.exe 94 PID 4832 wrote to memory of 4072 4832 2ca5fe9aa030e7487619f3d5c15b70ad.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ca5fe9aa030e7487619f3d5c15b70ad.exe"C:\Users\Admin\AppData\Local\Temp\2ca5fe9aa030e7487619f3d5c15b70ad.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2CA5FE~1.EXE > nul2⤵PID:4072
-
-
C:\Windows\SysWOW64\svcmrgb.exeC:\Windows\SysWOW64\svcmrgb.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1764
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD52ca5fe9aa030e7487619f3d5c15b70ad
SHA13c7849013a40537140aeb964cc3a85bbe807b2b0
SHA2568845916a98575b683ef72f70305a550b367c70416f91866298f34027f958c965
SHA51247cacdcd63846890928541ea279895829091082371929b88cc282ad5783749214ffdc8cdcdda0a0fb4a3f62a8f26cb76cc56d0ba86d1ff76e50f9679457a5e2e