Analysis
-
max time kernel
37s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25/05/2022, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
b4253f3ea96808cba77b8ceb0f76d1d4.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
b4253f3ea96808cba77b8ceb0f76d1d4.exe
-
Size
1.2MB
-
MD5
b4253f3ea96808cba77b8ceb0f76d1d4
-
SHA1
d4b776ae1c0fa40c532a812dd69cd199e1fef94e
-
SHA256
ff536d51ab667c0546c33352c460bbceb6722d333932ba992364b032cba6af1e
-
SHA512
bceebeb1435b0858b9462ad42fdab065c81f90db8f8ea19c6d08d14574720ec71a260b6675180362db9639d5707b0a11c7b6027d7c8e1055ba06a30c7cfb0c90
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce b4253f3ea96808cba77b8ceb0f76d1d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b4253f3ea96808cba77b8ceb0f76d1d4.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1292 sc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1292 1632 b4253f3ea96808cba77b8ceb0f76d1d4.exe 28 PID 1632 wrote to memory of 1292 1632 b4253f3ea96808cba77b8ceb0f76d1d4.exe 28 PID 1632 wrote to memory of 1292 1632 b4253f3ea96808cba77b8ceb0f76d1d4.exe 28 PID 1632 wrote to memory of 1292 1632 b4253f3ea96808cba77b8ceb0f76d1d4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4253f3ea96808cba77b8ceb0f76d1d4.exe"C:\Users\Admin\AppData\Local\Temp\b4253f3ea96808cba77b8ceb0f76d1d4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\sc.exesc -?2⤵
- Launches sc.exe
PID:1292
-