Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 11:15
Behavioral task
behavioral1
Sample
58c8444996386b67cb027fa671eab46d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
58c8444996386b67cb027fa671eab46d.exe
Resource
win10v2004-20231222-en
General
-
Target
58c8444996386b67cb027fa671eab46d.exe
-
Size
251KB
-
MD5
58c8444996386b67cb027fa671eab46d
-
SHA1
059133bdcb0c067a8a455c5f06d640978774ff57
-
SHA256
7d2c25cc02002045dc1da6a47c1bd38a3621a0b2f7e1dcf15ecbfba048ce0f80
-
SHA512
35ce7a654ded45a426c116f37cfedfb0336c781556fe3213610503772e32b206764eec49a50b32e094393d9775a83a35c7f5caa9b2c29e0af642902ccd8f26e0
-
SSDEEP
6144:SzclRDvO4SIA1AT+UBiPVCi55bdbP9GwCUKMCux:nbDvJAmTs9C+hGaCk
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 35761de5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 35761de5.exe -
resource yara_rule behavioral2/files/0x000600000001e5df-3.dat aspack_v212_v242 behavioral2/files/0x0006000000023236-11.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 4440 35761de5.exe -
Loads dropped DLL 12 IoCs
pid Process 528 svchost.exe 2704 svchost.exe 3216 svchost.exe 5092 svchost.exe 1308 svchost.exe 468 svchost.exe 3980 svchost.exe 4904 svchost.exe 4600 svchost.exe 3556 svchost.exe 4024 svchost.exe 4832 svchost.exe -
resource yara_rule behavioral2/memory/4032-0-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/files/0x000600000001e5df-3.dat upx behavioral2/memory/4440-5-0x00000000009F0000-0x0000000000A3D000-memory.dmp upx behavioral2/memory/4440-7-0x00000000009F0000-0x0000000000A3D000-memory.dmp upx behavioral2/memory/4440-6-0x00000000009F0000-0x0000000000A3D000-memory.dmp upx behavioral2/files/0x0006000000023236-11.dat upx behavioral2/memory/528-12-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/528-15-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/528-14-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/528-13-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/2704-20-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/2704-19-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/2704-21-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/3216-27-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/3216-28-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/3216-26-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/3216-29-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/4440-30-0x00000000009F0000-0x0000000000A3D000-memory.dmp upx behavioral2/memory/5092-34-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/5092-35-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/5092-36-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/5092-37-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/1308-41-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/1308-42-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/4032-43-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/1308-45-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/468-50-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/468-49-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/468-51-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/3980-57-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/3980-56-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/3980-58-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/4904-63-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/4904-64-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/4904-62-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/4904-65-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/4600-74-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/4600-75-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/4600-73-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/4600-76-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/3556-80-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/3556-83-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/3556-82-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/4024-89-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/4024-91-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/4024-90-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/4832-95-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/4832-98-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx behavioral2/memory/4832-97-0x0000000074F50000-0x0000000074F9D000-memory.dmp upx -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\LogonHours.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 35761de5.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 35761de5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4440 35761de5.exe 4440 35761de5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4440 4032 58c8444996386b67cb027fa671eab46d.exe 88 PID 4032 wrote to memory of 4440 4032 58c8444996386b67cb027fa671eab46d.exe 88 PID 4032 wrote to memory of 4440 4032 58c8444996386b67cb027fa671eab46d.exe 88 PID 4032 wrote to memory of 4924 4032 58c8444996386b67cb027fa671eab46d.exe 109 PID 4032 wrote to memory of 4924 4032 58c8444996386b67cb027fa671eab46d.exe 109 PID 4032 wrote to memory of 4924 4032 58c8444996386b67cb027fa671eab46d.exe 109 PID 4924 wrote to memory of 924 4924 cmd.exe 110 PID 4924 wrote to memory of 924 4924 cmd.exe 110 PID 4924 wrote to memory of 924 4924 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\58c8444996386b67cb027fa671eab46d.exe"C:\Users\Admin\AppData\Local\Temp\58c8444996386b67cb027fa671eab46d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\35761de5.exeC:\35761de5.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\240633468.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\mode.commode con cols=50 lines=153⤵PID:924
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:528
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
PID:2704
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
PID:3216
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
PID:5092
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
PID:1308
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
PID:468
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
PID:3980
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
PID:4904
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
PID:4600
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
PID:3556
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
PID:4024
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD52f85e77cf24aeccc9b45fbb8111e8281
SHA1733527ebc2cd96d8959687f82981ee53edba06be
SHA25691d4ded63ae059c700b3f914fa8f3d801f64de851541ef3c8b94092bba9a5049
SHA5124ccfaea2354e1d8058585ee56f886a6d337c297443a92a8e016c0978984b0690b73386b220dd82f29f8446d05160ed30f06d35f75914f5608296a31ae35e4378
-
Filesize
4KB
MD57e2e585c605c6e2c04a7cb041a2b577f
SHA1bc8aa58b04f8e41cf10ff8a4dcc17099c5a3e891
SHA2564ef02a35dc8f447e59ddcac97180ef923192e5b64a7368853edb0e17fc25b6c5
SHA512fb0808d1e8034794be2053f3102bac18fcd7e38227cc5042ae856306407526ed55cff6a412d6a5b1253b1a0cf42cf96f621447228cfe46ae5eec2596d51e4c77
-
Filesize
237KB
MD59998f3c081fe4f1868a46f19ba376b45
SHA1cc945a970dd893abeb80996ea748eeec907db5ae
SHA2562793e4b88b0c946f4874e2feb0b2cbf0b8c48627b867f12efdcb4697993476be
SHA51207d5249eccf7b27c3c0e980fcb27d6397e4c50a17d0cd02bf663b263b56858a51ba39068b649b6354bba130c27fa881ef8adc95b42e242f0a6afe6388d363f22