Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 08:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c56193df76c731b737c5d3a22181f514.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c56193df76c731b737c5d3a22181f514.exe
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
c56193df76c731b737c5d3a22181f514.exe
-
Size
11KB
-
MD5
c56193df76c731b737c5d3a22181f514
-
SHA1
8509bfcedad7d600a8076ab299ec50423b5a3cb3
-
SHA256
786e2b130659b2e2bd9f07d1ce27206ac4cb9589cd753bbaa04bb96e5f47cd36
-
SHA512
4c2d19ad3bac2a65d3b89f39cacaa0244e921f2a362a809a6ab374ca69a7420213d81de46e5048b6b8104a57cc409cdc8f8a41424e628fdbacb3269b7729d9e7
-
SSDEEP
192:l71EEVqFZquHa/MFS9SvzJQhbjpBS1mbDAVlDR8BDU:l71EEsZFWoS9tVDU
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RsTray = "C:\\Windows\\system32\\scvhost.exe" c56193df76c731b737c5d3a22181f514.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2188 sc.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 836 c56193df76c731b737c5d3a22181f514.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 836 wrote to memory of 3912 836 c56193df76c731b737c5d3a22181f514.exe 97 PID 836 wrote to memory of 3912 836 c56193df76c731b737c5d3a22181f514.exe 97 PID 836 wrote to memory of 3912 836 c56193df76c731b737c5d3a22181f514.exe 97 PID 3912 wrote to memory of 2356 3912 cmd.exe 99 PID 3912 wrote to memory of 2356 3912 cmd.exe 99 PID 3912 wrote to memory of 2356 3912 cmd.exe 99 PID 2356 wrote to memory of 1788 2356 net.exe 101 PID 2356 wrote to memory of 1788 2356 net.exe 101 PID 2356 wrote to memory of 1788 2356 net.exe 101 PID 836 wrote to memory of 420 836 c56193df76c731b737c5d3a22181f514.exe 102 PID 836 wrote to memory of 420 836 c56193df76c731b737c5d3a22181f514.exe 102 PID 836 wrote to memory of 420 836 c56193df76c731b737c5d3a22181f514.exe 102 PID 420 wrote to memory of 1664 420 cmd.exe 104 PID 420 wrote to memory of 1664 420 cmd.exe 104 PID 420 wrote to memory of 1664 420 cmd.exe 104 PID 1664 wrote to memory of 4736 1664 net.exe 105 PID 1664 wrote to memory of 4736 1664 net.exe 105 PID 1664 wrote to memory of 4736 1664 net.exe 105 PID 836 wrote to memory of 4356 836 c56193df76c731b737c5d3a22181f514.exe 107 PID 836 wrote to memory of 4356 836 c56193df76c731b737c5d3a22181f514.exe 107 PID 836 wrote to memory of 4356 836 c56193df76c731b737c5d3a22181f514.exe 107 PID 836 wrote to memory of 4620 836 c56193df76c731b737c5d3a22181f514.exe 108 PID 836 wrote to memory of 4620 836 c56193df76c731b737c5d3a22181f514.exe 108 PID 836 wrote to memory of 4620 836 c56193df76c731b737c5d3a22181f514.exe 108 PID 836 wrote to memory of 4012 836 c56193df76c731b737c5d3a22181f514.exe 109 PID 836 wrote to memory of 4012 836 c56193df76c731b737c5d3a22181f514.exe 109 PID 836 wrote to memory of 4012 836 c56193df76c731b737c5d3a22181f514.exe 109 PID 4620 wrote to memory of 532 4620 cmd.exe 113 PID 4620 wrote to memory of 532 4620 cmd.exe 113 PID 4620 wrote to memory of 532 4620 cmd.exe 113 PID 4012 wrote to memory of 2024 4012 cmd.exe 114 PID 4012 wrote to memory of 2024 4012 cmd.exe 114 PID 4012 wrote to memory of 2024 4012 cmd.exe 114 PID 4356 wrote to memory of 2188 4356 cmd.exe 115 PID 4356 wrote to memory of 2188 4356 cmd.exe 115 PID 4356 wrote to memory of 2188 4356 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\c56193df76c731b737c5d3a22181f514.exe"C:\Users\Admin\AppData\Local\Temp\c56193df76c731b737c5d3a22181f514.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.execmd /c net stop wscsvc2⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵PID:1788
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:4736
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config sharedaccess start= disabled2⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\sc.exesc config sharedaccess start= disabled3⤵
- Launches sc.exe
PID:2188
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32 /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32 /e /p everyone:f3⤵PID:532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f3⤵PID:2024
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:4264