Analysis
-
max time kernel
1s -
max time network
3s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19-07-2024 12:03
Behavioral task
behavioral1
Sample
WindowsAudioServicel.exe
Resource
win10-20240404-en
General
-
Target
WindowsAudioServicel.exe
-
Size
9.5MB
-
MD5
dc7b1ae6d4a8c83767e4f22bc6c05ebd
-
SHA1
b38b93dd7a8dbaef0e9aebcf71926fe6105f2ed8
-
SHA256
463369ef73bf575c2031e4735f3575e59ff696d3d3c7fd32f2bea3d2902a850b
-
SHA512
c137b55487a3797c3548b5112c1751337dc2ea049e9fd8f1c9bbaba76377be615182d540c74b8bbbb00fbab052a13c35dd722757f318568da05df514ba7c7752
-
SSDEEP
98304:OwkcpPjff2wzicqFkoJwcnXPzqEzo7F/3z26IZ:korffWkoJwMXPz3zq1IZ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Software\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" WindowsAudioServicel.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org 2 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4880 WindowsAudioServicel.exe Token: SeIncreaseQuotaPrivilege 4996 wmic.exe Token: SeSecurityPrivilege 4996 wmic.exe Token: SeTakeOwnershipPrivilege 4996 wmic.exe Token: SeLoadDriverPrivilege 4996 wmic.exe Token: SeSystemProfilePrivilege 4996 wmic.exe Token: SeSystemtimePrivilege 4996 wmic.exe Token: SeProfSingleProcessPrivilege 4996 wmic.exe Token: SeIncBasePriorityPrivilege 4996 wmic.exe Token: SeCreatePagefilePrivilege 4996 wmic.exe Token: SeBackupPrivilege 4996 wmic.exe Token: SeRestorePrivilege 4996 wmic.exe Token: SeShutdownPrivilege 4996 wmic.exe Token: SeDebugPrivilege 4996 wmic.exe Token: SeSystemEnvironmentPrivilege 4996 wmic.exe Token: SeRemoteShutdownPrivilege 4996 wmic.exe Token: SeUndockPrivilege 4996 wmic.exe Token: SeManageVolumePrivilege 4996 wmic.exe Token: 33 4996 wmic.exe Token: 34 4996 wmic.exe Token: 35 4996 wmic.exe Token: 36 4996 wmic.exe Token: SeIncreaseQuotaPrivilege 4996 wmic.exe Token: SeSecurityPrivilege 4996 wmic.exe Token: SeTakeOwnershipPrivilege 4996 wmic.exe Token: SeLoadDriverPrivilege 4996 wmic.exe Token: SeSystemProfilePrivilege 4996 wmic.exe Token: SeSystemtimePrivilege 4996 wmic.exe Token: SeProfSingleProcessPrivilege 4996 wmic.exe Token: SeIncBasePriorityPrivilege 4996 wmic.exe Token: SeCreatePagefilePrivilege 4996 wmic.exe Token: SeBackupPrivilege 4996 wmic.exe Token: SeRestorePrivilege 4996 wmic.exe Token: SeShutdownPrivilege 4996 wmic.exe Token: SeDebugPrivilege 4996 wmic.exe Token: SeSystemEnvironmentPrivilege 4996 wmic.exe Token: SeRemoteShutdownPrivilege 4996 wmic.exe Token: SeUndockPrivilege 4996 wmic.exe Token: SeManageVolumePrivilege 4996 wmic.exe Token: 33 4996 wmic.exe Token: 34 4996 wmic.exe Token: 35 4996 wmic.exe Token: 36 4996 wmic.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4880 wrote to memory of 3412 4880 WindowsAudioServicel.exe 74 PID 4880 wrote to memory of 3412 4880 WindowsAudioServicel.exe 74 PID 4880 wrote to memory of 1152 4880 WindowsAudioServicel.exe 75 PID 4880 wrote to memory of 1152 4880 WindowsAudioServicel.exe 75 PID 4880 wrote to memory of 4996 4880 WindowsAudioServicel.exe 76 PID 4880 wrote to memory of 4996 4880 WindowsAudioServicel.exe 76 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1152 attrib.exe 3412 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WindowsAudioServicel.exe"C:\Users\Admin\AppData\Local\Temp\WindowsAudioServicel.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\WindowsAudioServicel.exe2⤵
- Views/modifies file attributes
PID:3412
-
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe2⤵
- Views/modifies file attributes
PID:1152
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD5dc7b1ae6d4a8c83767e4f22bc6c05ebd
SHA1b38b93dd7a8dbaef0e9aebcf71926fe6105f2ed8
SHA256463369ef73bf575c2031e4735f3575e59ff696d3d3c7fd32f2bea3d2902a850b
SHA512c137b55487a3797c3548b5112c1751337dc2ea049e9fd8f1c9bbaba76377be615182d540c74b8bbbb00fbab052a13c35dd722757f318568da05df514ba7c7752