Overview
overview
10Static
static
80032588b8d...091.js
windows7_x64
10032588b8d...091.js
windows10_x64
109002c686e...2b.exe
windows7_x64
1009002c686e...2b.exe
windows10_x64
100b1551c0be...16.exe
windows7_x64
10b1551c0be...16.exe
windows10_x64
11048caa70a...29.exe
windows7_x64
101048caa70a...29.exe
windows10_x64
101c3170b776...b0.exe
windows7_x64
31c3170b776...b0.exe
windows10_x64
3240387329d...62.exe
windows7_x64
1240387329d...62.exe
windows10_x64
12573b35645...9a.exe
windows7_x64
102573b35645...9a.exe
windows10_x64
102df6c36b47...51.exe
windows7_x64
72df6c36b47...51.exe
windows10_x64
72df6c36b47...1).exe
windows7_x64
72df6c36b47...1).exe
windows10_x64
72e4319ff62...8b.dll
windows7_x64
12e4319ff62...8b.dll
windows10_x64
32fba2aba4b...07.exe
windows7_x64
12fba2aba4b...07.exe
windows10_x64
13ed5d687a4...bd.exe
windows7_x64
33ed5d687a4...bd.exe
windows10_x64
34fc17a5cf8...d5.exe
windows7_x64
64fc17a5cf8...d5.exe
windows10_x64
65942a02bc0...d3.dll
windows7_x64
105942a02bc0...d3.dll
windows10_x64
106e7785213d...3d.exe
windows7_x64
86e7785213d...3d.exe
windows10_x64
883c64ed85d...a0.exe
windows7_x64
1083c64ed85d...a0.exe
windows10_x64
10Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-03-2021 09:51
Static task
static1
Behavioral task
behavioral1
Sample
0032588b8d93a807cf0f48a806ccf125677503a6fabe4105a6dc69e81ace6091.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0032588b8d93a807cf0f48a806ccf125677503a6fabe4105a6dc69e81ace6091.js
Resource
win10v20201028
Behavioral task
behavioral3
Sample
09002c686e358799a9d732f4483a31a858bb140a3dfd59df54b1d449d2f8122b.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
09002c686e358799a9d732f4483a31a858bb140a3dfd59df54b1d449d2f8122b.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
1048caa70a44f59a621e209cc10308256e7495a427245260469812ca1b710629.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
1048caa70a44f59a621e209cc10308256e7495a427245260469812ca1b710629.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
1c3170b776327a73e95e554258be94a70d6861b37242fe48a5126d06e33de1b0.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
1c3170b776327a73e95e554258be94a70d6861b37242fe48a5126d06e33de1b0.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
240387329dee4f03f98a89a2feff9bf30dcba61fcf614cdac24129da54442762.exe
Resource
win7v20201028
Behavioral task
behavioral12
Sample
240387329dee4f03f98a89a2feff9bf30dcba61fcf614cdac24129da54442762.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
2573b356452dd5ee24c10537fa4848d882fa40a2a8fa5a181624ba460e1f769a.exe
Resource
win7v20201028
Behavioral task
behavioral14
Sample
2573b356452dd5ee24c10537fa4848d882fa40a2a8fa5a181624ba460e1f769a.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951.exe
Resource
win7v20201028
Behavioral task
behavioral16
Sample
2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951.exe
Resource
win10v20201028
Behavioral task
behavioral17
Sample
2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951(1).exe
Resource
win7v20201028
Behavioral task
behavioral18
Sample
2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951(1).exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
2e4319ff62c03a539b2b2f71768a0cfc0adcaedbcca69dbf235081fe2816248b.dll
Resource
win7v20201028
Behavioral task
behavioral20
Sample
2e4319ff62c03a539b2b2f71768a0cfc0adcaedbcca69dbf235081fe2816248b.dll
Resource
win10v20201028
Behavioral task
behavioral21
Sample
2fba2aba4b6d7ff3a8b262399a30c7f45ff15cfab932c25fc61477278171a107.exe
Resource
win7v20201028
Behavioral task
behavioral22
Sample
2fba2aba4b6d7ff3a8b262399a30c7f45ff15cfab932c25fc61477278171a107.exe
Resource
win10v20201028
Behavioral task
behavioral23
Sample
3ed5d687a46e865424395d3dd455f69c82ac0b22fa24f361db6e87e7aa5019bd.exe
Resource
win7v20201028
Behavioral task
behavioral24
Sample
3ed5d687a46e865424395d3dd455f69c82ac0b22fa24f361db6e87e7aa5019bd.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
4fc17a5cf81946e26f1846986557801c0a802e56255c7d112cc3edc0d70255d5.exe
Resource
win7v20201028
Behavioral task
behavioral26
Sample
4fc17a5cf81946e26f1846986557801c0a802e56255c7d112cc3edc0d70255d5.exe
Resource
win10v20201028
Behavioral task
behavioral27
Sample
5942a02bc0a0e32875bc71e9a678b065d5f0e144938467a3590ba884884153d3.dll
Resource
win7v20201028
Behavioral task
behavioral28
Sample
5942a02bc0a0e32875bc71e9a678b065d5f0e144938467a3590ba884884153d3.dll
Resource
win10v20201028
Behavioral task
behavioral29
Sample
6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe
Resource
win7v20201028
Behavioral task
behavioral30
Sample
6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe
Resource
win10v20201028
Behavioral task
behavioral31
Sample
83c64ed85d0245b22a7fb1e1f529ccd4db58b49fc6cf656c8d56712fa0b9fea0.exe
Resource
win7v20201028
Behavioral task
behavioral32
Sample
83c64ed85d0245b22a7fb1e1f529ccd4db58b49fc6cf656c8d56712fa0b9fea0.exe
Resource
win10v20201028
General
-
Target
6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe
-
Size
117KB
-
MD5
31963075abec1ca51a7c8416baf097f2
-
SHA1
44b5e306c4b3af5c7819eaef7b13a3560ecaefac
-
SHA256
6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d
-
SHA512
44b0eea2e51040c3e93b8a8935ce95d277ba195543fa345e849c894ebff22bbc4eadbb0dee504c8d39e70441bf4a19ce9ecd87cdd6c2d7997ddc33bcc6f06f56
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\wecgfegt\\ijcudgfs.exe" explorer.exe -
Deletes itself 1 IoCs
pid Process 1428 explorer.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1428 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 29 PID 1676 wrote to memory of 1428 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 29 PID 1676 wrote to memory of 1428 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 29 PID 1676 wrote to memory of 1428 1676 6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe"C:\Users\Admin\AppData\Local\Temp\6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe"1⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Adds policy Run key to start application
- Deletes itself
PID:1428
-