Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-11-2020 14:05
Static task
static1
Behavioral task
behavioral1
Sample
b1f9e56f5f399655d7b00ed436c2514d.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b1f9e56f5f399655d7b00ed436c2514d.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
b1f9e56f5f399655d7b00ed436c2514d.exe
-
Size
152KB
-
MD5
305ec15725b8982d7149c51c355e2040
-
SHA1
4855474dd9fe83c3c26d215fe5d44b855b2602f5
-
SHA256
11e8d690d96faf9092f3ce17ef36384660cab59bf2b1540f28c5671c26ecece2
-
SHA512
e919936a6b0d2603785060df589be2253a2d1ebdbb444e1c3e2b173957f31d0982dba6dc88215f2ce4772a916bb28fbfae51f94fdc09e746dc24fe850bd0f404
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\D02424DC = "C:\\Users\\Admin\\AppData\\Roaming\\D02424DC\\bin.exe" winver.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe 2036 winver.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2036 winver.exe 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1080 b1f9e56f5f399655d7b00ed436c2514d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2036 1080 b1f9e56f5f399655d7b00ed436c2514d.exe 26 PID 1080 wrote to memory of 2036 1080 b1f9e56f5f399655d7b00ed436c2514d.exe 26 PID 1080 wrote to memory of 2036 1080 b1f9e56f5f399655d7b00ed436c2514d.exe 26 PID 1080 wrote to memory of 2036 1080 b1f9e56f5f399655d7b00ed436c2514d.exe 26 PID 1080 wrote to memory of 2036 1080 b1f9e56f5f399655d7b00ed436c2514d.exe 26 PID 2036 wrote to memory of 1236 2036 winver.exe 21 PID 2036 wrote to memory of 1116 2036 winver.exe 19 PID 2036 wrote to memory of 1176 2036 winver.exe 20 PID 2036 wrote to memory of 1236 2036 winver.exe 21
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\b1f9e56f5f399655d7b00ed436c2514d.exe"C:\Users\Admin\AppData\Local\Temp\b1f9e56f5f399655d7b00ed436c2514d.exe"2⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2036
-
-