Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 14:05
Static task
static1
Behavioral task
behavioral1
Sample
b1f9e56f5f399655d7b00ed436c2514d.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b1f9e56f5f399655d7b00ed436c2514d.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
b1f9e56f5f399655d7b00ed436c2514d.exe
-
Size
152KB
-
MD5
305ec15725b8982d7149c51c355e2040
-
SHA1
4855474dd9fe83c3c26d215fe5d44b855b2602f5
-
SHA256
11e8d690d96faf9092f3ce17ef36384660cab59bf2b1540f28c5671c26ecece2
-
SHA512
e919936a6b0d2603785060df589be2253a2d1ebdbb444e1c3e2b173957f31d0982dba6dc88215f2ce4772a916bb28fbfae51f94fdc09e746dc24fe850bd0f404
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run winver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\76A01B7A = "C:\\Users\\Admin\\AppData\\Roaming\\76A01B7A\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe 420 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 420 winver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1680 Explorer.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1028 wrote to memory of 420 1028 b1f9e56f5f399655d7b00ed436c2514d.exe 76 PID 1028 wrote to memory of 420 1028 b1f9e56f5f399655d7b00ed436c2514d.exe 76 PID 1028 wrote to memory of 420 1028 b1f9e56f5f399655d7b00ed436c2514d.exe 76 PID 1028 wrote to memory of 420 1028 b1f9e56f5f399655d7b00ed436c2514d.exe 76 PID 420 wrote to memory of 1680 420 winver.exe 57 PID 420 wrote to memory of 2816 420 winver.exe 54 PID 420 wrote to memory of 2840 420 winver.exe 55 PID 420 wrote to memory of 2952 420 winver.exe 56 PID 420 wrote to memory of 1680 420 winver.exe 57 PID 420 wrote to memory of 3292 420 winver.exe 58 PID 420 wrote to memory of 3304 420 winver.exe 59 PID 420 wrote to memory of 3492 420 winver.exe 60 PID 420 wrote to memory of 3748 420 winver.exe 61 PID 420 wrote to memory of 2256 420 winver.exe 75
Processes
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2816
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2840
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2952
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\b1f9e56f5f399655d7b00ed436c2514d.exe"C:\Users\Admin\AppData\Local\Temp\b1f9e56f5f399655d7b00ed436c2514d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:420
-
-
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:3292
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵PID:3304
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3492
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3748
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2256