Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 07:02
Static task
static1
Behavioral task
behavioral1
Sample
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe
-
Size
190KB
-
MD5
b317f65392f062494cd4d1b386b5ced1
-
SHA1
495d9526a469aeaa253a00f571b1348fe95f745c
-
SHA256
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37
-
SHA512
e9452e9cdaf5a4b48af351005f9b3d043e8f26de5eaa47971f5493a20acedf0dbcd9dfe6301e17fcb527827ce3faee8de87d1b15da1e11801b7eeef0c74e0281
Malware Config
Extracted
Family
gootkit
Botnet
2860
C2
adp.reevesandcompany.com
picturecrafting.site
Attributes
-
vendor_id
2860
Signatures
-
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{D3EA8448-98DD-4CC3-8DDD-1E68FDD97ECE}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{4BD1FEC7-9A11-42FA-BE54-507DB8C66129}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exepid process 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exedescription pid process target process PID 2488 wrote to memory of 536 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe PID 2488 wrote to memory of 536 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe PID 2488 wrote to memory of 536 2488 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe 3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe"C:\Users\Admin\AppData\Local\Temp\3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe"1⤵
- Modifies Internet Explorer Protected Mode
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exeC:\Users\Admin\AppData\Local\Temp\3e846a7316dbc15a38cfd522b14ad3f1a72d79959cbae9fd14621400d77cbc37.exe --vwxyz2⤵PID:536
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1284