Analysis
-
max time kernel
163s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-05-2022 21:47
Static task
static1
Behavioral task
behavioral1
Sample
087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe
Resource
win7-20220414-en
General
-
Target
087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe
-
Size
264KB
-
MD5
af0b810ee30058e5cea264fed2a15f05
-
SHA1
7aae8004f0042d3c4d250ace81053dbc3e31fecf
-
SHA256
087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555
-
SHA512
56b7da6973995c0e007ce78f62c5a45db54f8448ff7f0af6fcebe1a5f63c5d30b6864b7d0ae5c940f0db1d12c7363d87037a2b166caf51bc9b32175a95072710
Malware Config
Extracted
gootkit
410
parking.dynophyl.com
parked.dynonortheast.com
trktrk.eu
smeinsurances.co.uk
-
vendor_id
410
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mstsc.exepid process 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe 2640 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exepid process 3716 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exepid process 3716 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exemstsc.execmd.exedescription pid process target process PID 3716 wrote to memory of 2640 3716 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe mstsc.exe PID 3716 wrote to memory of 2640 3716 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe mstsc.exe PID 3716 wrote to memory of 2640 3716 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe mstsc.exe PID 3716 wrote to memory of 2640 3716 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe mstsc.exe PID 3716 wrote to memory of 2640 3716 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe mstsc.exe PID 3716 wrote to memory of 2640 3716 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe mstsc.exe PID 3716 wrote to memory of 2640 3716 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe mstsc.exe PID 3716 wrote to memory of 2640 3716 087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe mstsc.exe PID 2640 wrote to memory of 2824 2640 mstsc.exe cmd.exe PID 2640 wrote to memory of 2824 2640 mstsc.exe cmd.exe PID 2640 wrote to memory of 2824 2640 mstsc.exe cmd.exe PID 2824 wrote to memory of 4300 2824 cmd.exe attrib.exe PID 2824 wrote to memory of 4300 2824 cmd.exe attrib.exe PID 2824 wrote to memory of 4300 2824 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe"C:\Users\Admin\AppData\Local\Temp\087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\mstsc.exeC:\Windows\System32\mstsc.exe "C:\Users\Admin\AppData\Local\Temp\087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240584515.bat" "C:\Users\Admin\AppData\Local\Temp\087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\087b9f549d23316dc43dd3f6b2280fdfde113bc457b785066f8657115a7ef555.exe"4⤵
- Views/modifies file attributes
PID:4300
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5a0b56dbfec40bc9e00e413253c74041c
SHA10495a408fa21c4002a858bece5ede1bc78a1c6fd
SHA256c5f526e250b512ac9415ac62599c08dfc9a27e2e44d5dd309b08948b1653c81a
SHA512f6d75d4474456fa9755b6516c638e617b4edb75afaf86e7b5a107967426daa2e4736dbac9600e3c31a27b6294b8bb0149fcac862091130f4ef749d708c30e647