Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 01:09
Behavioral task
behavioral1
Sample
ccb8d8296b3254b770858ee8ac43949c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccb8d8296b3254b770858ee8ac43949c.exe
Resource
win10v2004-20240226-en
General
-
Target
ccb8d8296b3254b770858ee8ac43949c.exe
-
Size
2.0MB
-
MD5
ccb8d8296b3254b770858ee8ac43949c
-
SHA1
51a6bcdf1de4d6a7139e19fadb4e7370db04364f
-
SHA256
479673352af2a3d404a0d18be7ef62716134bad546fd8ba0a6d0cc908dba2016
-
SHA512
2645084db4136f0fd08d4b5b3ed3c882b3a495335fe666f4ceca4d5b351e93b55ffa452c9c7d7e19ded55c23717057049d55c6419c31fe364454f92dd7258e4a
-
SSDEEP
49152:ItARufdWU5Dc8X1aXfLPoDqhoWBBGlcaS31zx:IGRufdn5DNFaTPoDkJGXSl1
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 5d867b70.exe -
resource yara_rule behavioral1/files/0x000a000000012255-6.dat aspack_v212_v242 behavioral1/files/0x0031000000014665-15.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1672 5d867b70.exe -
Loads dropped DLL 12 IoCs
pid Process 2592 svchost.exe 2576 svchost.exe 2500 svchost.exe 2980 svchost.exe 2708 svchost.exe 2832 svchost.exe 1904 svchost.exe 1148 svchost.exe 2984 svchost.exe 896 svchost.exe 2680 svchost.exe 2228 svchost.exe -
resource yara_rule behavioral1/memory/2388-1-0x0000000000400000-0x0000000000863000-memory.dmp upx behavioral1/memory/2388-57-0x0000000000400000-0x0000000000863000-memory.dmp upx behavioral1/memory/2388-59-0x0000000000400000-0x0000000000863000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2388-57-0x0000000000400000-0x0000000000863000-memory.dmp autoit_exe behavioral1/memory/2388-59-0x0000000000400000-0x0000000000863000-memory.dmp autoit_exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Wmi.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 5d867b70.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1672 5d867b70.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1672 2388 ccb8d8296b3254b770858ee8ac43949c.exe 28 PID 2388 wrote to memory of 1672 2388 ccb8d8296b3254b770858ee8ac43949c.exe 28 PID 2388 wrote to memory of 1672 2388 ccb8d8296b3254b770858ee8ac43949c.exe 28 PID 2388 wrote to memory of 1672 2388 ccb8d8296b3254b770858ee8ac43949c.exe 28 PID 2388 wrote to memory of 1672 2388 ccb8d8296b3254b770858ee8ac43949c.exe 28 PID 2388 wrote to memory of 1672 2388 ccb8d8296b3254b770858ee8ac43949c.exe 28 PID 2388 wrote to memory of 1672 2388 ccb8d8296b3254b770858ee8ac43949c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccb8d8296b3254b770858ee8ac43949c.exe"C:\Users\Admin\AppData\Local\Temp\ccb8d8296b3254b770858ee8ac43949c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\5d867b70.exeC:\5d867b70.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2592
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2576
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2500
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2980
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2708
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2832
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1904
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵PID:1476
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1148
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2984
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:896
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2680
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD561b39462bdb688c427c2200b8687e09f
SHA1ad645a23de7c9abff758c2189905f41d230e3609
SHA2563ffcd8107479ea1f325d5d234129c3a1e8f427c93b04cee7042ae895a05af792
SHA512cbe9a07ed64d3790a0aef804fecbe69a2ed3bdbc40c16b1edbfe714bd9cf8c965fd37123a3cb5f8c07c26171caa9a4b7fb3e9c5d6127a7005018bd4b326c36ae
-
Filesize
64KB
MD57f10c62fc25523032799101647658904
SHA19e373798bd7742975ec14396053a8c4ffdc84ce9
SHA256339c45b81c0ecc0e0bbbff2dd5ec9e2032d779a0711604a041147d2a05b08313
SHA51285e8d7a82dea31791171a64feb76e7ddaf7a2c3c7f3805d52888dfa0a756eef22af779719a68fdb7ea2ed6dfb44cba0ef10743c64c3fc4c26a14f236331f93d5