Analysis
-
max time kernel
138s -
max time network
185s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-07-2021 14:55
Static task
static1
Behavioral task
behavioral1
Sample
Specifications_Details_20330_FLQ.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Specifications_Details_20330_FLQ.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
Specifications_Details_20330_FLQ.exe
-
Size
799KB
-
MD5
edbb2066fd9539e279bf48077b755a40
-
SHA1
f914783d5d5aeeb95eda30a8c456624e471108a2
-
SHA256
41f206a7e8b3c15642e6cfad479ae3f0972b82e57ec46a5ffd31e51954a81c6c
-
SHA512
8c9fa977b79afbbe9a49f0bb3ee93479f4bb4b44211fac8c87beae2e8ca917c0c3be783ce6a0d1e268bf92b2ddd893454a86d13c95a732896206429e5cc98862
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Specifications_Details_20330_FLQ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\notepad = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\notepad\\notepad.exe\"" Specifications_Details_20330_FLQ.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 checkip.dyndns.org 9 freegeoip.app 10 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Specifications_Details_20330_FLQ.exedescription pid process target process PID 1672 set thread context of 564 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Specifications_Details_20330_FLQ.exeSpecifications_Details_20330_FLQ.exepid process 1672 Specifications_Details_20330_FLQ.exe 1672 Specifications_Details_20330_FLQ.exe 1672 Specifications_Details_20330_FLQ.exe 564 Specifications_Details_20330_FLQ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Specifications_Details_20330_FLQ.exeSpecifications_Details_20330_FLQ.exedescription pid process Token: SeDebugPrivilege 1672 Specifications_Details_20330_FLQ.exe Token: SeDebugPrivilege 564 Specifications_Details_20330_FLQ.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Specifications_Details_20330_FLQ.exedescription pid process target process PID 1672 wrote to memory of 760 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 760 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 760 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 760 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 564 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 564 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 564 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 564 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 564 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 564 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 564 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 564 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 1672 wrote to memory of 564 1672 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Specifications_Details_20330_FLQ.exe"C:\Users\Admin\AppData\Local\Temp\Specifications_Details_20330_FLQ.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Specifications_Details_20330_FLQ.exeC:\Users\Admin\AppData\Local\Temp\Specifications_Details_20330_FLQ.exe2⤵PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\Specifications_Details_20330_FLQ.exeC:\Users\Admin\AppData\Local\Temp\Specifications_Details_20330_FLQ.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-