Resubmissions
15-01-2022 17:03
220115-vks6cseha4 1015-01-2022 17:02
220115-vj9fysfbgj 715-01-2022 16:58
220115-vg7jksegh8 7Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
15-01-2022 17:03
Static task
static1
Behavioral task
behavioral1
Sample
063822ca7966327be6a3dadb06e16d6c.exe.vir.exe
Resource
win10-en-20211208
Behavioral task
behavioral2
Sample
063822ca7966327be6a3dadb06e16d6c.exe.vir.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
063822ca7966327be6a3dadb06e16d6c.exe.vir.exe
Resource
win11
General
-
Target
063822ca7966327be6a3dadb06e16d6c.exe.vir.exe
-
Size
5.6MB
-
MD5
063822ca7966327be6a3dadb06e16d6c
-
SHA1
68f61f2bcf3c325adbb190b892297d78a4f75254
-
SHA256
515f555c06db60243a892bbdf57704792956569387482f6a7a001a782bb6bcd1
-
SHA512
8c6e0963f3d8c4510426e8cf7511e62cd65eb6873037e235f9b27ac52736f4535ccc1cf499e2c689285c4bc76a9e3cb276c6dc5144bf1bd1222714333e698be5
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3828-117-0x0000000000AC0000-0x00000000013C6000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
063822ca7966327be6a3dadb06e16d6c.exe.vir.exepid process 3828 063822ca7966327be6a3dadb06e16d6c.exe.vir.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
063822ca7966327be6a3dadb06e16d6c.exe.vir.exepid process 3828 063822ca7966327be6a3dadb06e16d6c.exe.vir.exe 3828 063822ca7966327be6a3dadb06e16d6c.exe.vir.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
063822ca7966327be6a3dadb06e16d6c.exe.vir.exepid process 3828 063822ca7966327be6a3dadb06e16d6c.exe.vir.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
063822ca7966327be6a3dadb06e16d6c.exe.vir.exedescription pid process target process PID 3828 wrote to memory of 3020 3828 063822ca7966327be6a3dadb06e16d6c.exe.vir.exe cmd.exe PID 3828 wrote to memory of 3020 3828 063822ca7966327be6a3dadb06e16d6c.exe.vir.exe cmd.exe PID 3828 wrote to memory of 3020 3828 063822ca7966327be6a3dadb06e16d6c.exe.vir.exe cmd.exe PID 3828 wrote to memory of 1252 3828 063822ca7966327be6a3dadb06e16d6c.exe.vir.exe cmd.exe PID 3828 wrote to memory of 1252 3828 063822ca7966327be6a3dadb06e16d6c.exe.vir.exe cmd.exe PID 3828 wrote to memory of 1252 3828 063822ca7966327be6a3dadb06e16d6c.exe.vir.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\063822ca7966327be6a3dadb06e16d6c.exe.vir.exe"C:\Users\Admin\AppData\Local\Temp\063822ca7966327be6a3dadb06e16d6c.exe.vir.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C://Windows//spoofer.exe2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1252-120-0x0000000000000000-mapping.dmp
-
memory/3020-119-0x0000000000000000-mapping.dmp
-
memory/3828-115-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/3828-116-0x0000000000A60000-0x0000000000A61000-memory.dmpFilesize
4KB
-
memory/3828-117-0x0000000000AC0000-0x00000000013C6000-memory.dmpFilesize
9.0MB
-
memory/3828-118-0x00000000008B0000-0x00000000008C3000-memory.dmpFilesize
76KB