Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 07:27
Static task
static1
Behavioral task
behavioral1
Sample
3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe
-
Size
191KB
-
MD5
9c6d6a18cf015f54f1f4c97654f663e7
-
SHA1
cfab1438f3139b63c2346a175ac66a2b58da0324
-
SHA256
3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d
-
SHA512
d2c4c9ad11b3cc331278985e01dc5991931fe91161eead6c9541a7b7bb042747d16c58bf4ac774f3916e1ade4305e437a46b0495782a11b0186ffe31adc24200
Malware Config
Extracted
Family
gootkit
Botnet
2860
C2
adp.reevesandcompany.com
picturecrafting.site
Attributes
-
vendor_id
2860
Signatures
-
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exepid process 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exedescription pid process target process PID 1488 wrote to memory of 2016 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe PID 1488 wrote to memory of 2016 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe PID 1488 wrote to memory of 2016 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe PID 1488 wrote to memory of 2016 1488 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe 3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe"C:\Users\Admin\AppData\Local\Temp\3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe"1⤵
- Modifies Internet Explorer Protected Mode
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exeC:\Users\Admin\AppData\Local\Temp\3e2009d1a556bcf5be30e975d83dfd938d271598435460516acc4739304a7e8d.exe --vwxyz2⤵PID:2016
-