Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
09-05-2021 17:40
Static task
static1
Behavioral task
behavioral1
Sample
dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe
Resource
win10v20210408
General
-
Target
dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe
-
Size
98KB
-
MD5
c94c47b62d0b6dd0da48475613e40c9f
-
SHA1
2bbe856ed8f59e54f7090b36b16f5ed45fd54050
-
SHA256
dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5
-
SHA512
252b9b2a4a7c0c9c61917492f9a111e9928dcc8c2cd2ec64c0013173cf27f1cadbda1ca222bc439ea2119c2610d526325196e9fae0327fcb235847c216f4d436
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
winver.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run winver.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\D6275189 = "C:\\Users\\Admin\\AppData\\Roaming\\D6275189\\bin.exe" winver.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exedescription pid process target process PID 752 set thread context of 3200 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2180 3760 WerFault.exe DllHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exewinver.exeWerFault.exepid process 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe 3648 winver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3060 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
WerFault.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2180 WerFault.exe Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 3648 winver.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exepid process 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3060 Explorer.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exedca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exewinver.exedescription pid process target process PID 752 wrote to memory of 3200 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe PID 752 wrote to memory of 3200 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe PID 752 wrote to memory of 3200 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe PID 752 wrote to memory of 3200 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe PID 752 wrote to memory of 3200 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe PID 752 wrote to memory of 3200 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe PID 752 wrote to memory of 3200 752 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe PID 3200 wrote to memory of 3648 3200 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe winver.exe PID 3200 wrote to memory of 3648 3200 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe winver.exe PID 3200 wrote to memory of 3648 3200 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe winver.exe PID 3200 wrote to memory of 3648 3200 dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe winver.exe PID 3648 wrote to memory of 3060 3648 winver.exe Explorer.EXE PID 3648 wrote to memory of 2332 3648 winver.exe sihost.exe PID 3648 wrote to memory of 2348 3648 winver.exe svchost.exe PID 3648 wrote to memory of 2748 3648 winver.exe taskhostw.exe PID 3648 wrote to memory of 3060 3648 winver.exe Explorer.EXE PID 3648 wrote to memory of 3264 3648 winver.exe ShellExperienceHost.exe PID 3648 wrote to memory of 3276 3648 winver.exe SearchUI.exe PID 3648 wrote to memory of 3464 3648 winver.exe RuntimeBroker.exe PID 3648 wrote to memory of 3760 3648 winver.exe DllHost.exe PID 3648 wrote to memory of 3920 3648 winver.exe DllHost.exe PID 3648 wrote to memory of 200 3648 winver.exe PID 3648 wrote to memory of 2180 3648 winver.exe WerFault.exe PID 3648 wrote to memory of 4044 3648 winver.exe slui.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe"C:\Users\Admin\AppData\Local\Temp\dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exeC:\Users\Admin\AppData\Local\Temp\dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\winver.exewinver4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3648
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3760
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3760 -s 8482⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3464
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵PID:3276
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:3264
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2748
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2348
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2332
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3920
-
C:\Windows\System32\slui.exeC:\Windows\System32\slui.exe -Embedding1⤵PID:4044