Analysis
-
max time kernel
134s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 01:09
Behavioral task
behavioral1
Sample
ccb8d8296b3254b770858ee8ac43949c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccb8d8296b3254b770858ee8ac43949c.exe
Resource
win10v2004-20240226-en
General
-
Target
ccb8d8296b3254b770858ee8ac43949c.exe
-
Size
2.0MB
-
MD5
ccb8d8296b3254b770858ee8ac43949c
-
SHA1
51a6bcdf1de4d6a7139e19fadb4e7370db04364f
-
SHA256
479673352af2a3d404a0d18be7ef62716134bad546fd8ba0a6d0cc908dba2016
-
SHA512
2645084db4136f0fd08d4b5b3ed3c882b3a495335fe666f4ceca4d5b351e93b55ffa452c9c7d7e19ded55c23717057049d55c6419c31fe364454f92dd7258e4a
-
SSDEEP
49152:ItARufdWU5Dc8X1aXfLPoDqhoWBBGlcaS31zx:IGRufdn5DNFaTPoDkJGXSl1
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 5d867b70.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 5d867b70.exe -
resource yara_rule behavioral2/files/0x00080000000232fa-3.dat aspack_v212_v242 behavioral2/files/0x0002000000022853-9.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2644 5d867b70.exe -
Loads dropped DLL 12 IoCs
pid Process 3284 svchost.exe 5096 svchost.exe 2516 svchost.exe 4560 svchost.exe 848 svchost.exe 4068 svchost.exe 408 svchost.exe 2712 svchost.exe 3208 svchost.exe 3136 svchost.exe 412 svchost.exe 4348 svchost.exe -
resource yara_rule behavioral2/memory/4604-0-0x0000000000400000-0x0000000000863000-memory.dmp upx behavioral2/memory/4604-23-0x0000000000400000-0x0000000000863000-memory.dmp upx behavioral2/memory/4604-67-0x0000000000400000-0x0000000000863000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4604-67-0x0000000000400000-0x0000000000863000-memory.dmp autoit_exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nla.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 5d867b70.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 5d867b70.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2644 5d867b70.exe 2644 5d867b70.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2644 4604 ccb8d8296b3254b770858ee8ac43949c.exe 89 PID 4604 wrote to memory of 2644 4604 ccb8d8296b3254b770858ee8ac43949c.exe 89 PID 4604 wrote to memory of 2644 4604 ccb8d8296b3254b770858ee8ac43949c.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccb8d8296b3254b770858ee8ac43949c.exe"C:\Users\Admin\AppData\Local\Temp\ccb8d8296b3254b770858ee8ac43949c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\5d867b70.exeC:\5d867b70.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:3284
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
PID:5096
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
PID:2516
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
PID:4560
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
PID:848
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
PID:4068
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
PID:408
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
PID:2712
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
PID:3208
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
PID:3136
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
PID:412
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD561b39462bdb688c427c2200b8687e09f
SHA1ad645a23de7c9abff758c2189905f41d230e3609
SHA2563ffcd8107479ea1f325d5d234129c3a1e8f427c93b04cee7042ae895a05af792
SHA512cbe9a07ed64d3790a0aef804fecbe69a2ed3bdbc40c16b1edbfe714bd9cf8c965fd37123a3cb5f8c07c26171caa9a4b7fb3e9c5d6127a7005018bd4b326c36ae
-
Filesize
64KB
MD57f10c62fc25523032799101647658904
SHA19e373798bd7742975ec14396053a8c4ffdc84ce9
SHA256339c45b81c0ecc0e0bbbff2dd5ec9e2032d779a0711604a041147d2a05b08313
SHA51285e8d7a82dea31791171a64feb76e7ddaf7a2c3c7f3805d52888dfa0a756eef22af779719a68fdb7ea2ed6dfb44cba0ef10743c64c3fc4c26a14f236331f93d5