Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 12:14
Static task
static1
Behavioral task
behavioral1
Sample
4b1cc55485401ff64c0b4fd074f941eb.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4b1cc55485401ff64c0b4fd074f941eb.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
4b1cc55485401ff64c0b4fd074f941eb.exe
-
Size
152KB
-
MD5
0c006c2d559220f0f18cbd99f6924674
-
SHA1
91fac222a17f3fff564f2c89aac41dd74793eb54
-
SHA256
47ea2f6c893753b726f6192d5a14c681fe0c2da7c741341965cf449be81c18ab
-
SHA512
f925f7189f70fc73736d7b5fa65ae5f86aa93dfb74f240d79ecb6b144f053a75932c071b3b9c7d2053c516d0f873875ee9c55c3473e6c092fb3e6b44f0592951
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\4935D74E = "C:\\Users\\Admin\\AppData\\Roaming\\4935D74E\\bin.exe" winver.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe 3196 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 3196 winver.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3048 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
4b1cc55485401ff64c0b4fd074f941eb.exewinver.exedescription pid process target process PID 656 wrote to memory of 3196 656 4b1cc55485401ff64c0b4fd074f941eb.exe winver.exe PID 656 wrote to memory of 3196 656 4b1cc55485401ff64c0b4fd074f941eb.exe winver.exe PID 656 wrote to memory of 3196 656 4b1cc55485401ff64c0b4fd074f941eb.exe winver.exe PID 656 wrote to memory of 3196 656 4b1cc55485401ff64c0b4fd074f941eb.exe winver.exe PID 3196 wrote to memory of 3048 3196 winver.exe Explorer.EXE PID 3196 wrote to memory of 2348 3196 winver.exe sihost.exe PID 3196 wrote to memory of 2368 3196 winver.exe svchost.exe PID 3196 wrote to memory of 2500 3196 winver.exe taskhostw.exe PID 3196 wrote to memory of 3048 3196 winver.exe Explorer.EXE PID 3196 wrote to memory of 3272 3196 winver.exe ShellExperienceHost.exe PID 3196 wrote to memory of 3288 3196 winver.exe SearchUI.exe PID 3196 wrote to memory of 3500 3196 winver.exe RuntimeBroker.exe PID 3196 wrote to memory of 3788 3196 winver.exe DllHost.exe PID 3196 wrote to memory of 656 3196 winver.exe 4b1cc55485401ff64c0b4fd074f941eb.exe PID 3196 wrote to memory of 4064 3196 winver.exe DllHost.exe
Processes
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2348
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2368
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2500
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\4b1cc55485401ff64c0b4fd074f941eb.exe"C:\Users\Admin\AppData\Local\Temp\4b1cc55485401ff64c0b4fd074f941eb.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3196
-
-
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:3272
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵PID:3288
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3500
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3788
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4064