Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 03:16
Behavioral task
behavioral1
Sample
8b41570d02a0a6ae998834e0ad4faec8.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
8b41570d02a0a6ae998834e0ad4faec8.exe
-
Size
3.3MB
-
MD5
8b41570d02a0a6ae998834e0ad4faec8
-
SHA1
dcc3100e3b3dcbfd32a12413a9c29271316d8849
-
SHA256
bfe30dbf14be8059ded251ef8505784288bc84bff7a8817e496388090bc3841d
-
SHA512
f148958251e920ce3ef5ca4bb13f0868116358ffd78e607f4eab9e458235c5be167373858b79be6242241bb6cd035e4e873863b7e46fa4dc0f3207df86b3f503
-
SSDEEP
98304:/Qq9GOfbVzES6BZNjFrcQ056/M/Cu1mTQMgNomHg1kac:/vG+2SGZNjuQAoYWIu
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral2/memory/4292-0-0x0000000000400000-0x0000000000E66000-memory.dmp upx behavioral2/memory/4292-2-0x0000000000400000-0x0000000000E66000-memory.dmp upx behavioral2/memory/4292-4-0x0000000000400000-0x0000000000E66000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4684 sc.exe 1128 sc.exe -
Runs net.exe
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4292 8b41570d02a0a6ae998834e0ad4faec8.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4292 wrote to memory of 1652 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 92 PID 4292 wrote to memory of 1652 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 92 PID 4292 wrote to memory of 1652 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 92 PID 4292 wrote to memory of 3960 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 87 PID 4292 wrote to memory of 3960 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 87 PID 4292 wrote to memory of 3960 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 87 PID 4292 wrote to memory of 4684 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 85 PID 4292 wrote to memory of 4684 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 85 PID 4292 wrote to memory of 4684 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 85 PID 4292 wrote to memory of 1128 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 86 PID 4292 wrote to memory of 1128 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 86 PID 4292 wrote to memory of 1128 4292 8b41570d02a0a6ae998834e0ad4faec8.exe 86 PID 1652 wrote to memory of 3772 1652 net.exe 94 PID 1652 wrote to memory of 3772 1652 net.exe 94 PID 1652 wrote to memory of 3772 1652 net.exe 94 PID 3960 wrote to memory of 4524 3960 net.exe 93 PID 3960 wrote to memory of 4524 3960 net.exe 93 PID 3960 wrote to memory of 4524 3960 net.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b41570d02a0a6ae998834e0ad4faec8.exe"C:\Users\Admin\AppData\Local\Temp\8b41570d02a0a6ae998834e0ad4faec8.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\sc.exesc stop GbpSv2⤵
- Launches sc.exe
PID:4684
-
-
C:\Windows\SysWOW64\sc.exesc config GbpSv start= disabled2⤵
- Launches sc.exe
PID:1128
-
-
C:\Windows\SysWOW64\net.exenet stop GbpSv2⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop GbpSv3⤵PID:4524
-
-
-
C:\Windows\SysWOW64\net.exenet start GbpSv2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start GbpSv3⤵PID:3772
-
-