Analysis
-
max time kernel
149s -
max time network
43s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
27-06-2021 11:19
Static task
static1
Behavioral task
behavioral1
Sample
TT-3.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
TT-3.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
TT-3.exe
-
Size
4.9MB
-
MD5
0b4ab2b8547d9d49b35788f9da74b439
-
SHA1
7452326f93c8dc33695dee74e092aabcac462f3b
-
SHA256
60e93179fdc24865d5d06c00a6280a224263def03b1d9b081b0edf972ed95ad1
-
SHA512
89d6ca06231f9b9534d6938e1f698c06ee3ab594351940e2e5ec6b1a8079426bbccf20474a9808848885705627a80cf0511df76e4c5c0b8f56f2a09df3e9bb46
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
TT-3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\InstallAgent = "\"C:\\Users\\Admin\\AppData\\Roaming\\InstallAgent\\InstallAgent.exe\"" TT-3.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
TT-3.exedescription pid process target process PID 1912 set thread context of 1032 1912 TT-3.exe TT-3.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
TT-3.exepid process 1912 TT-3.exe 1912 TT-3.exe 1912 TT-3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
TT-3.exedescription pid process Token: SeDebugPrivilege 1912 TT-3.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
TT-3.exedescription pid process target process PID 1912 wrote to memory of 1032 1912 TT-3.exe TT-3.exe PID 1912 wrote to memory of 1032 1912 TT-3.exe TT-3.exe PID 1912 wrote to memory of 1032 1912 TT-3.exe TT-3.exe PID 1912 wrote to memory of 1032 1912 TT-3.exe TT-3.exe PID 1912 wrote to memory of 1032 1912 TT-3.exe TT-3.exe PID 1912 wrote to memory of 1032 1912 TT-3.exe TT-3.exe PID 1912 wrote to memory of 1032 1912 TT-3.exe TT-3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TT-3.exe"C:\Users\Admin\AppData\Local\Temp\TT-3.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\TT-3.exeC:\Users\Admin\AppData\Local\Temp\TT-3.exe2⤵PID:1032
-