Analysis
-
max time kernel
144s -
max time network
23s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
20-11-2020 01:48
Static task
static1
Behavioral task
behavioral1
Sample
68be2ba31.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
68be2ba31.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
68be2ba31.exe
-
Size
144KB
-
MD5
1c1d7bf3ad926f3cdf0befbc5205a1fe
-
SHA1
a766d7dd2055edb485d72f1f5319e9b2492b1d96
-
SHA256
68be2ba319d445f1a1d7da73d9ad26b894f55f85f1b943ab5b5251ddfc0bc439
-
SHA512
77a1da28aa74a1a994e1aaf48faa8f74718682e96de4a6bbd3216555219c3a5bc578bc03521faafc5ce98540c751df6b8fa45f043c12e6602f560e284715cb8d
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsEnv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\68be2ba31.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\StartingAuro = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1900 set thread context of 1356 1900 68be2ba31.exe 25 PID 1356 set thread context of 1676 1356 68be2ba31.exe 30 PID 1748 set thread context of 652 1748 68be2ba31.exe 32 PID 652 set thread context of 684 652 68be2ba31.exe 33 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1900 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe 1748 68be2ba31.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1356 68be2ba31.exe 652 68be2ba31.exe 684 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 684 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 684 explorer.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1900 wrote to memory of 1356 1900 68be2ba31.exe 25 PID 1356 wrote to memory of 1676 1356 68be2ba31.exe 30 PID 1356 wrote to memory of 1676 1356 68be2ba31.exe 30 PID 1356 wrote to memory of 1676 1356 68be2ba31.exe 30 PID 1356 wrote to memory of 1676 1356 68be2ba31.exe 30 PID 1900 wrote to memory of 1748 1900 68be2ba31.exe 31 PID 1900 wrote to memory of 1748 1900 68be2ba31.exe 31 PID 1900 wrote to memory of 1748 1900 68be2ba31.exe 31 PID 1900 wrote to memory of 1748 1900 68be2ba31.exe 31 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 1748 wrote to memory of 652 1748 68be2ba31.exe 32 PID 652 wrote to memory of 684 652 68be2ba31.exe 33 PID 652 wrote to memory of 684 652 68be2ba31.exe 33 PID 652 wrote to memory of 684 652 68be2ba31.exe 33 PID 652 wrote to memory of 684 652 68be2ba31.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:684
-
-
-