Analysis
-
max time kernel
155s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-03-2022 02:42
Static task
static1
Behavioral task
behavioral1
Sample
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe
Resource
win10v2004-en-20220113
General
-
Target
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe
-
Size
1.8MB
-
MD5
5ba0e5344b203b7f9ac4e9bf0bbe060c
-
SHA1
d551975424fe578ff59a0e6e7da5495aed6982a7
-
SHA256
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a
-
SHA512
a11043d878407404d20f13c087a9253a50097446c94c4e687d836f3688243bef57abf565601c0f360f9d394500486c6662038914fcccb50e6b484d225b103cef
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oKeuReKAhG.url 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exedescription pid process target process PID 1268 set thread context of 768 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exepid process 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exepid process 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exepid process 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exepid process 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exeRegSvcs.exedescription pid process target process PID 1268 wrote to memory of 768 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe RegSvcs.exe PID 1268 wrote to memory of 768 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe RegSvcs.exe PID 1268 wrote to memory of 768 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe RegSvcs.exe PID 1268 wrote to memory of 768 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe RegSvcs.exe PID 1268 wrote to memory of 768 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe RegSvcs.exe PID 1268 wrote to memory of 768 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe RegSvcs.exe PID 1268 wrote to memory of 768 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe RegSvcs.exe PID 1268 wrote to memory of 768 1268 879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe RegSvcs.exe PID 768 wrote to memory of 1460 768 RegSvcs.exe dw20.exe PID 768 wrote to memory of 1460 768 RegSvcs.exe dw20.exe PID 768 wrote to memory of 1460 768 RegSvcs.exe dw20.exe PID 768 wrote to memory of 1460 768 RegSvcs.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe"C:\Users\Admin\AppData\Local\Temp\879353cf97b065067ca2a580ec846c70a54e613acffbd500a2df9fa55e7be42a.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4123⤵PID:1460