Analysis
-
max time kernel
151s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 07:47
Static task
static1
Behavioral task
behavioral1
Sample
daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe
-
Size
189KB
-
MD5
70a6c66362517d855bbdd73568329da6
-
SHA1
61891b1f935071b98d64708b2c444083e1f4e2e2
-
SHA256
daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296
-
SHA512
3eccec491b7feffd5bc56792b66ec9d164ff1e3c84dfb44c70dbf536608b3f23fef898bd7a5f1759105770562e8399b2b25147b2cc462d28140389a0dd9fe565
Malware Config
Extracted
Family
gootkit
Botnet
2855
C2
me.jmitchelldayton.com
otnhmtkwodm1.site
Attributes
-
vendor_id
2855
Signatures
-
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exepid process 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exedescription pid process target process PID 1652 wrote to memory of 2004 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe PID 1652 wrote to memory of 2004 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe PID 1652 wrote to memory of 2004 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe PID 1652 wrote to memory of 2004 1652 daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe"C:\Users\Admin\AppData\Local\Temp\daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe"1⤵
- Modifies Internet Explorer Protected Mode
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exeC:\Users\Admin\AppData\Local\Temp\daf467c1c3d8cc8f7f692afa01d60027e310070b28e467e7b75f638025c95296.exe --vwxyz2⤵PID:2004
-