Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe
Resource
win10v2004-20240802-en
General
-
Target
fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe
-
Size
16.6MB
-
MD5
a4ee3ed90cfe37b966eea81519abfea5
-
SHA1
95931de0aa6d96568acebc11e551e8e1305bf003
-
SHA256
fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a
-
SHA512
ca3686c8ed2808d046d8247df110aa3c72266aeb7ffb65a82187c0d9cfe6c72b1c0ca1b20d830876067e64bfee8dae38abd53a3a6a9cd493138b1a43379f121c
-
SSDEEP
393216:EWZZAS/MwIOGiSZFAqOTYGDTCSq//svd:EYZP/MwIS5m//
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2152 svcss.exe 476 Process not Found 2728 svcss.exe -
Loads dropped DLL 2 IoCs
pid Process 2092 fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe 2092 fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2152 2092 fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe 30 PID 2092 wrote to memory of 2152 2092 fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe 30 PID 2092 wrote to memory of 2152 2092 fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe 30 PID 2092 wrote to memory of 2152 2092 fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe 30 PID 2728 wrote to memory of 2900 2728 svcss.exe 33 PID 2728 wrote to memory of 2900 2728 svcss.exe 33 PID 2728 wrote to memory of 2900 2728 svcss.exe 33 PID 2900 wrote to memory of 2876 2900 cmd.exe 35 PID 2900 wrote to memory of 2876 2900 cmd.exe 35 PID 2900 wrote to memory of 2876 2900 cmd.exe 35 PID 2844 wrote to memory of 2936 2844 taskeng.exe 37 PID 2844 wrote to memory of 2936 2844 taskeng.exe 37 PID 2844 wrote to memory of 2936 2844 taskeng.exe 37 PID 2936 wrote to memory of 2848 2936 cmd.exe 39 PID 2936 wrote to memory of 2848 2936 cmd.exe 39 PID 2936 wrote to memory of 2848 2936 cmd.exe 39 PID 2848 wrote to memory of 2980 2848 net.exe 40 PID 2848 wrote to memory of 2980 2848 net.exe 40 PID 2848 wrote to memory of 2980 2848 net.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe"C:\Users\Admin\AppData\Local\Temp\fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\ProgramData\MicrosoftSMM\svcss.exe"C:\ProgramData\MicrosoftSMM\svcss.exe" /install2⤵
- Executes dropped EXE
PID:2152
-
-
C:\ProgramData\MicrosoftSMM\svcss.exeC:\ProgramData\MicrosoftSMM\svcss.exe /startedbyscm:00D244E7-B5119CE0-UpdateStorServ1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\cmd.execmd.exe /C schtasks /query /TN "Monitor Service"2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\schtasks.exeschtasks /query /TN "Monitor Service"3⤵PID:2876
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B2F89629-20D4-43F0-81A5-9B99F06A165F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\cmd.execmd.exe /c net start "UpdateStorServ"2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\net.exenet start "UpdateStorServ"3⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start "UpdateStorServ"4⤵PID:2980
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.3MB
MD5b66b904185a9e881b77fcbcca7bcb125
SHA14b07391434332e4f8faadf61f288e48389bcea08
SHA2563c0be13be97c2b7ac3737997bb56f604a947b4d404456f644b2af4be4f9c17d2
SHA51203d05f0bd94c0d1956be4949aa29a99bc0f1f8a3812d90fc4be3338cb596056bb3d37e865b3d29e8107ab945e79f3068ae4d85189927d8544855acaee9e3db59