Analysis
-
max time kernel
142s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-11-2020 01:48
Static task
static1
Behavioral task
behavioral1
Sample
68be2ba31.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
68be2ba31.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
68be2ba31.exe
-
Size
144KB
-
MD5
1c1d7bf3ad926f3cdf0befbc5205a1fe
-
SHA1
a766d7dd2055edb485d72f1f5319e9b2492b1d96
-
SHA256
68be2ba319d445f1a1d7da73d9ad26b894f55f85f1b943ab5b5251ddfc0bc439
-
SHA512
77a1da28aa74a1a994e1aaf48faa8f74718682e96de4a6bbd3216555219c3a5bc578bc03521faafc5ce98540c751df6b8fa45f043c12e6602f560e284715cb8d
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsEnv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\68be2ba31.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\StartingAuro = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2268 set thread context of 956 2268 68be2ba31.exe 73 PID 956 set thread context of 1500 956 68be2ba31.exe 78 PID 2900 set thread context of 3972 2900 68be2ba31.exe 80 PID 3972 set thread context of 1324 3972 68be2ba31.exe 81 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2268 68be2ba31.exe 2268 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe 2900 68be2ba31.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 956 68be2ba31.exe 3972 68be2ba31.exe 1324 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1324 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1324 explorer.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2268 wrote to memory of 956 2268 68be2ba31.exe 73 PID 2268 wrote to memory of 956 2268 68be2ba31.exe 73 PID 2268 wrote to memory of 956 2268 68be2ba31.exe 73 PID 2268 wrote to memory of 956 2268 68be2ba31.exe 73 PID 2268 wrote to memory of 956 2268 68be2ba31.exe 73 PID 2268 wrote to memory of 956 2268 68be2ba31.exe 73 PID 2268 wrote to memory of 956 2268 68be2ba31.exe 73 PID 2268 wrote to memory of 956 2268 68be2ba31.exe 73 PID 2268 wrote to memory of 956 2268 68be2ba31.exe 73 PID 2268 wrote to memory of 956 2268 68be2ba31.exe 73 PID 956 wrote to memory of 1500 956 68be2ba31.exe 78 PID 956 wrote to memory of 1500 956 68be2ba31.exe 78 PID 956 wrote to memory of 1500 956 68be2ba31.exe 78 PID 2268 wrote to memory of 2900 2268 68be2ba31.exe 79 PID 2268 wrote to memory of 2900 2268 68be2ba31.exe 79 PID 2268 wrote to memory of 2900 2268 68be2ba31.exe 79 PID 2900 wrote to memory of 3972 2900 68be2ba31.exe 80 PID 2900 wrote to memory of 3972 2900 68be2ba31.exe 80 PID 2900 wrote to memory of 3972 2900 68be2ba31.exe 80 PID 2900 wrote to memory of 3972 2900 68be2ba31.exe 80 PID 2900 wrote to memory of 3972 2900 68be2ba31.exe 80 PID 2900 wrote to memory of 3972 2900 68be2ba31.exe 80 PID 2900 wrote to memory of 3972 2900 68be2ba31.exe 80 PID 2900 wrote to memory of 3972 2900 68be2ba31.exe 80 PID 2900 wrote to memory of 3972 2900 68be2ba31.exe 80 PID 2900 wrote to memory of 3972 2900 68be2ba31.exe 80 PID 3972 wrote to memory of 1324 3972 68be2ba31.exe 81 PID 3972 wrote to memory of 1324 3972 68be2ba31.exe 81 PID 3972 wrote to memory of 1324 3972 68be2ba31.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"C:\Users\Admin\AppData\Local\Temp\68be2ba31.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
-