Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
4ec8ca8dd0c11283448403c20ef87a8f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4ec8ca8dd0c11283448403c20ef87a8f.exe
Resource
win10v2004-20231222-en
General
-
Target
4ec8ca8dd0c11283448403c20ef87a8f.exe
-
Size
12KB
-
MD5
4ec8ca8dd0c11283448403c20ef87a8f
-
SHA1
89a8e0a015e12473ed6fe17d1cf310e7ed55fc30
-
SHA256
e88daa890f42b5d6da8086978c51f9a075f5fa69614c1fe8793435c4e3e69f8b
-
SHA512
b4c4693b3175aaad772783636bb4f1d1a6d5e971d47ac3e2b25a96b1542f61e1375ea5fa3ba209779c801de9e749f7caf446d49fd29e959ffba48df0402150b3
-
SSDEEP
192:Ixs1aDvPtCdusj0bLoiYPF8laLlLcsAQt+NU5EA+R5fdr3rWMBAe9ZbJnIyCaoZk:IlbhsIbLoiYvNcsttPy5fzAeKywZUL55
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\msupdate\ImagePath = "c:\\windows\\system32\\mssrv32.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 4868 svchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\D4C1C.tmp.sys 4ec8ca8dd0c11283448403c20ef87a8f.exe File created \??\c:\windows\SysWOW64\mssrv32.exe 4ec8ca8dd0c11283448403c20ef87a8f.exe File opened for modification \??\c:\windows\SysWOW64\mssrv32.exe 4ec8ca8dd0c11283448403c20ef87a8f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3008 set thread context of 4868 3008 4ec8ca8dd0c11283448403c20ef87a8f.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 1960 4868 WerFault.exe 30 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3988 4ec8ca8dd0c11283448403c20ef87a8f.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3008 3988 4ec8ca8dd0c11283448403c20ef87a8f.exe 22 PID 3988 wrote to memory of 3008 3988 4ec8ca8dd0c11283448403c20ef87a8f.exe 22 PID 3988 wrote to memory of 3008 3988 4ec8ca8dd0c11283448403c20ef87a8f.exe 22 PID 3008 wrote to memory of 4868 3008 4ec8ca8dd0c11283448403c20ef87a8f.exe 30 PID 3008 wrote to memory of 4868 3008 4ec8ca8dd0c11283448403c20ef87a8f.exe 30 PID 3008 wrote to memory of 4868 3008 4ec8ca8dd0c11283448403c20ef87a8f.exe 30 PID 3008 wrote to memory of 4868 3008 4ec8ca8dd0c11283448403c20ef87a8f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ec8ca8dd0c11283448403c20ef87a8f.exe"C:\Users\Admin\AppData\Local\Temp\4ec8ca8dd0c11283448403c20ef87a8f.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
\??\c:\users\admin\appdata\local\temp\4ec8ca8dd0c11283448403c20ef87a8f.exec:\users\admin\appdata\local\temp\4ec8ca8dd0c11283448403c20ef87a8f.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Sets service image path in registry
- Deletes itself
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 3444⤵
- Program crash
PID:1960
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4868 -ip 48681⤵PID:920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD54ec8ca8dd0c11283448403c20ef87a8f
SHA189a8e0a015e12473ed6fe17d1cf310e7ed55fc30
SHA256e88daa890f42b5d6da8086978c51f9a075f5fa69614c1fe8793435c4e3e69f8b
SHA512b4c4693b3175aaad772783636bb4f1d1a6d5e971d47ac3e2b25a96b1542f61e1375ea5fa3ba209779c801de9e749f7caf446d49fd29e959ffba48df0402150b3