Analysis
-
max time kernel
4294210s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
26-03-2022 01:31
Static task
static1
Behavioral task
behavioral1
Sample
a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe
Resource
win10v2004-en-20220113
General
-
Target
a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe
-
Size
574KB
-
MD5
011b2875be9ca2bcea3c43e63f400e0a
-
SHA1
1853ffa2ef4ada9f9a1c4a7be4f92a7b4576ac75
-
SHA256
a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0
-
SHA512
941ceca0dd09fef3276a8f471b76872060c8618d409ee7ae8ab35d71f9c98937c482281c572af94a337feaddd6e40cee61ad218deb14f137d20fc76cba018d2b
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exepid process 1860 a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exepid process 1860 a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exepid process 1860 a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe 1860 a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe"C:\Users\Admin\AppData\Local\Temp\a8119bd657575eb0702ec5aac03df6b74d3210b2ed8b1cc4e0f218dafe45ede0.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1860