Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 07:02
Static task
static1
Behavioral task
behavioral1
Sample
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe
-
Size
190KB
-
MD5
b317f65392f062494cd4d1b386b5ced1
-
SHA1
495d9526a469aeaa253a00f571b1348fe95f745c
-
SHA256
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37
-
SHA512
e9452e9cdaf5a4b48af351005f9b3d043e8f26de5eaa47971f5493a20acedf0dbcd9dfe6301e17fcb527827ce3faee8de87d1b15da1e11801b7eeef0c74e0281
Malware Config
Extracted
Family
gootkit
Botnet
2860
C2
adp.reevesandcompany.com
picturecrafting.site
Attributes
-
vendor_id
2860
Signatures
-
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exepid process 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exedescription pid process target process PID 1808 wrote to memory of 1248 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe PID 1808 wrote to memory of 1248 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe PID 1808 wrote to memory of 1248 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe PID 1808 wrote to memory of 1248 1808 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe"C:\Users\Admin\AppData\Local\Temp\3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe"1⤵
- Modifies Internet Explorer Protected Mode
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exeC:\Users\Admin\AppData\Local\Temp\3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe --vwxyz2⤵PID:1248
-