Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 07:33
Static task
static1
Behavioral task
behavioral1
Sample
PO-Scan-Documents00012910993993.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PO-Scan-Documents00012910993993.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
PO-Scan-Documents00012910993993.exe
-
Size
177KB
-
MD5
a2c17f6556ae89a8a1683f889bffc7e9
-
SHA1
cf2aa59cc8e074dfd3d72b052beef746aba1fe6a
-
SHA256
4c61692f5b36f6b2b136958c7c315113899a1bdb1cfe7415f37c0acfdaab01a7
-
SHA512
9f18670e24387969db2fee5cbc9698cfdac86997d1b5ac63e39cf973e0170473440ed3cd0a130ab00b339bf89802b14da425f52bb5c62c651eea0c486a993b37
Score
10/10
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 752 owerrinta.exe 860 owerrinta.exe 1180 owerrinta.exe -
Deletes itself 1 IoCs
pid Process 1816 WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ PO-Scan-Documents00012910993993.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\owerrita = "\"C:\\Users\\Admin\\AppData\\Roaming\\owerri\\owerrinta.exe\"" PO-Scan-Documents00012910993993.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ owerrinta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\owerrita = "\"C:\\Users\\Admin\\AppData\\Roaming\\owerri\\owerrinta.exe\"" owerrinta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings PO-Scan-Documents00012910993993.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1180 owerrinta.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 756 wrote to memory of 3024 756 PO-Scan-Documents00012910993993.exe 78 PID 756 wrote to memory of 3024 756 PO-Scan-Documents00012910993993.exe 78 PID 756 wrote to memory of 3024 756 PO-Scan-Documents00012910993993.exe 78 PID 3024 wrote to memory of 1816 3024 PO-Scan-Documents00012910993993.exe 79 PID 3024 wrote to memory of 1816 3024 PO-Scan-Documents00012910993993.exe 79 PID 3024 wrote to memory of 1816 3024 PO-Scan-Documents00012910993993.exe 79 PID 1816 wrote to memory of 3292 1816 WScript.exe 80 PID 1816 wrote to memory of 3292 1816 WScript.exe 80 PID 1816 wrote to memory of 3292 1816 WScript.exe 80 PID 3292 wrote to memory of 752 3292 cmd.exe 82 PID 3292 wrote to memory of 752 3292 cmd.exe 82 PID 3292 wrote to memory of 752 3292 cmd.exe 82 PID 752 wrote to memory of 860 752 owerrinta.exe 83 PID 752 wrote to memory of 860 752 owerrinta.exe 83 PID 752 wrote to memory of 860 752 owerrinta.exe 83 PID 860 wrote to memory of 1180 860 owerrinta.exe 84 PID 860 wrote to memory of 1180 860 owerrinta.exe 84 PID 860 wrote to memory of 1180 860 owerrinta.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO-Scan-Documents00012910993993.exe"C:\Users\Admin\AppData\Local\Temp\PO-Scan-Documents00012910993993.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\PO-Scan-Documents00012910993993.exe"C:\Users\Admin\AppData\Local\Temp\PO-Scan-Documents00012910993993.exe"2⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exeC:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
-
-
-
-