Analysis
-
max time kernel
60s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
Winsvc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Winsvc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Winsvc.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
Winsvc.exe
Resource
win11-20241007-en
General
-
Target
Winsvc.exe
-
Size
1.6MB
-
MD5
3e4461418de7a12e7951ccf51fe4d4d3
-
SHA1
d7332419080c1a8eaef111439feb71bda300a1d3
-
SHA256
96c7d1d5dab0c8060f3220816e3e49461ef328643d520545ffc8aa05ddd76760
-
SHA512
b01982718c3f62059f086c3274f9f8d1c98bbb9bcc187bfa466b369d08818cd2fe06e0949256eddbfd6f26b3fd5428ea8008d49adf6f233282f08c8dce4e9553
-
SSDEEP
24576:9sRgQPPLVkiouiRjaMkVRu9JS70cJscGh6U8mEGKacNpVAADNi5GeZTOjo:9sV3LGjpkVIJunw98mTKfVAyNioSTO
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 2344 created 3432 2344 Winsvc.exe 56 PID 2204 created 3432 2204 InnerException.exe 56 PID 744 created 3432 744 RegSvcs.exe 56 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FailedAssemblyInfo.vbs Winsvc.exe -
Executes dropped EXE 2 IoCs
pid Process 2204 InnerException.exe 2532 InnerException.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2344 set thread context of 1756 2344 Winsvc.exe 83 PID 2204 set thread context of 2532 2204 InnerException.exe 98 PID 2532 set thread context of 744 2532 InnerException.exe 99 PID 744 set thread context of 2228 744 RegSvcs.exe 100 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2344 Winsvc.exe 2204 InnerException.exe 744 RegSvcs.exe 2228 RegSvcs.exe 2228 RegSvcs.exe 2228 RegSvcs.exe 2228 RegSvcs.exe 2228 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2344 Winsvc.exe Token: SeDebugPrivilege 2344 Winsvc.exe Token: SeDebugPrivilege 1756 Winsvc.exe Token: SeDebugPrivilege 2204 InnerException.exe Token: SeDebugPrivilege 2204 InnerException.exe Token: SeDebugPrivilege 2532 InnerException.exe Token: SeDebugPrivilege 744 RegSvcs.exe Token: SeDebugPrivilege 744 RegSvcs.exe Token: SeDebugPrivilege 2228 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1756 2344 Winsvc.exe 83 PID 2344 wrote to memory of 1756 2344 Winsvc.exe 83 PID 2344 wrote to memory of 1756 2344 Winsvc.exe 83 PID 2344 wrote to memory of 1756 2344 Winsvc.exe 83 PID 2344 wrote to memory of 1756 2344 Winsvc.exe 83 PID 2344 wrote to memory of 1756 2344 Winsvc.exe 83 PID 2204 wrote to memory of 2532 2204 InnerException.exe 98 PID 2204 wrote to memory of 2532 2204 InnerException.exe 98 PID 2204 wrote to memory of 2532 2204 InnerException.exe 98 PID 2204 wrote to memory of 2532 2204 InnerException.exe 98 PID 2204 wrote to memory of 2532 2204 InnerException.exe 98 PID 2204 wrote to memory of 2532 2204 InnerException.exe 98 PID 2532 wrote to memory of 744 2532 InnerException.exe 99 PID 2532 wrote to memory of 744 2532 InnerException.exe 99 PID 2532 wrote to memory of 744 2532 InnerException.exe 99 PID 2532 wrote to memory of 744 2532 InnerException.exe 99 PID 2532 wrote to memory of 744 2532 InnerException.exe 99 PID 2532 wrote to memory of 744 2532 InnerException.exe 99 PID 744 wrote to memory of 2228 744 RegSvcs.exe 100 PID 744 wrote to memory of 2228 744 RegSvcs.exe 100 PID 744 wrote to memory of 2228 744 RegSvcs.exe 100 PID 744 wrote to memory of 2228 744 RegSvcs.exe 100 PID 744 wrote to memory of 2228 744 RegSvcs.exe 100 PID 744 wrote to memory of 2228 744 RegSvcs.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\Winsvc.exe"C:\Users\Admin\AppData\Local\Temp\Winsvc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\Winsvc.exe"C:\Users\Admin\AppData\Local\Temp\Winsvc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Users\Admin\AppData\Roaming\Access\InnerException.exe"C:\Users\Admin\AppData\Roaming\Access\InnerException.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Users\Admin\AppData\Roaming\Access\InnerException.exeC:\Users\Admin\AppData\Roaming\Access\InnerException.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD53e4461418de7a12e7951ccf51fe4d4d3
SHA1d7332419080c1a8eaef111439feb71bda300a1d3
SHA25696c7d1d5dab0c8060f3220816e3e49461ef328643d520545ffc8aa05ddd76760
SHA512b01982718c3f62059f086c3274f9f8d1c98bbb9bcc187bfa466b369d08818cd2fe06e0949256eddbfd6f26b3fd5428ea8008d49adf6f233282f08c8dce4e9553