Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 08:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c56193df76c731b737c5d3a22181f514.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c56193df76c731b737c5d3a22181f514.exe
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
c56193df76c731b737c5d3a22181f514.exe
-
Size
11KB
-
MD5
c56193df76c731b737c5d3a22181f514
-
SHA1
8509bfcedad7d600a8076ab299ec50423b5a3cb3
-
SHA256
786e2b130659b2e2bd9f07d1ce27206ac4cb9589cd753bbaa04bb96e5f47cd36
-
SHA512
4c2d19ad3bac2a65d3b89f39cacaa0244e921f2a362a809a6ab374ca69a7420213d81de46e5048b6b8104a57cc409cdc8f8a41424e628fdbacb3269b7729d9e7
-
SSDEEP
192:l71EEVqFZquHa/MFS9SvzJQhbjpBS1mbDAVlDR8BDU:l71EEsZFWoS9tVDU
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RsTray = "C:\\Windows\\system32\\scvhost.exe" c56193df76c731b737c5d3a22181f514.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2440 sc.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 c56193df76c731b737c5d3a22181f514.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1888 2320 c56193df76c731b737c5d3a22181f514.exe 28 PID 2320 wrote to memory of 1888 2320 c56193df76c731b737c5d3a22181f514.exe 28 PID 2320 wrote to memory of 1888 2320 c56193df76c731b737c5d3a22181f514.exe 28 PID 2320 wrote to memory of 1888 2320 c56193df76c731b737c5d3a22181f514.exe 28 PID 1888 wrote to memory of 2724 1888 cmd.exe 30 PID 1888 wrote to memory of 2724 1888 cmd.exe 30 PID 1888 wrote to memory of 2724 1888 cmd.exe 30 PID 1888 wrote to memory of 2724 1888 cmd.exe 30 PID 2724 wrote to memory of 2912 2724 net.exe 31 PID 2724 wrote to memory of 2912 2724 net.exe 31 PID 2724 wrote to memory of 2912 2724 net.exe 31 PID 2724 wrote to memory of 2912 2724 net.exe 31 PID 2320 wrote to memory of 2092 2320 c56193df76c731b737c5d3a22181f514.exe 32 PID 2320 wrote to memory of 2092 2320 c56193df76c731b737c5d3a22181f514.exe 32 PID 2320 wrote to memory of 2092 2320 c56193df76c731b737c5d3a22181f514.exe 32 PID 2320 wrote to memory of 2092 2320 c56193df76c731b737c5d3a22181f514.exe 32 PID 2092 wrote to memory of 2656 2092 cmd.exe 34 PID 2092 wrote to memory of 2656 2092 cmd.exe 34 PID 2092 wrote to memory of 2656 2092 cmd.exe 34 PID 2092 wrote to memory of 2656 2092 cmd.exe 34 PID 2656 wrote to memory of 2660 2656 net.exe 35 PID 2656 wrote to memory of 2660 2656 net.exe 35 PID 2656 wrote to memory of 2660 2656 net.exe 35 PID 2656 wrote to memory of 2660 2656 net.exe 35 PID 2320 wrote to memory of 2672 2320 c56193df76c731b737c5d3a22181f514.exe 36 PID 2320 wrote to memory of 2672 2320 c56193df76c731b737c5d3a22181f514.exe 36 PID 2320 wrote to memory of 2672 2320 c56193df76c731b737c5d3a22181f514.exe 36 PID 2320 wrote to memory of 2672 2320 c56193df76c731b737c5d3a22181f514.exe 36 PID 2320 wrote to memory of 2700 2320 c56193df76c731b737c5d3a22181f514.exe 37 PID 2320 wrote to memory of 2700 2320 c56193df76c731b737c5d3a22181f514.exe 37 PID 2320 wrote to memory of 2700 2320 c56193df76c731b737c5d3a22181f514.exe 37 PID 2320 wrote to memory of 2700 2320 c56193df76c731b737c5d3a22181f514.exe 37 PID 2320 wrote to memory of 2552 2320 c56193df76c731b737c5d3a22181f514.exe 39 PID 2320 wrote to memory of 2552 2320 c56193df76c731b737c5d3a22181f514.exe 39 PID 2320 wrote to memory of 2552 2320 c56193df76c731b737c5d3a22181f514.exe 39 PID 2320 wrote to memory of 2552 2320 c56193df76c731b737c5d3a22181f514.exe 39 PID 2700 wrote to memory of 2600 2700 cmd.exe 43 PID 2700 wrote to memory of 2600 2700 cmd.exe 43 PID 2700 wrote to memory of 2600 2700 cmd.exe 43 PID 2700 wrote to memory of 2600 2700 cmd.exe 43 PID 2672 wrote to memory of 2440 2672 cmd.exe 42 PID 2672 wrote to memory of 2440 2672 cmd.exe 42 PID 2672 wrote to memory of 2440 2672 cmd.exe 42 PID 2672 wrote to memory of 2440 2672 cmd.exe 42 PID 2552 wrote to memory of 2692 2552 cmd.exe 44 PID 2552 wrote to memory of 2692 2552 cmd.exe 44 PID 2552 wrote to memory of 2692 2552 cmd.exe 44 PID 2552 wrote to memory of 2692 2552 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\c56193df76c731b737c5d3a22181f514.exe"C:\Users\Admin\AppData\Local\Temp\c56193df76c731b737c5d3a22181f514.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd /c net stop wscsvc2⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵PID:2912
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2660
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config sharedaccess start= disabled2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\sc.exesc config sharedaccess start= disabled3⤵
- Launches sc.exe
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32 /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32 /e /p everyone:f3⤵PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f3⤵PID:2692
-
-