Analysis
-
max time kernel
152s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 17:55
Static task
static1
Behavioral task
behavioral1
Sample
3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe
Resource
win10v2004-20220414-en
General
-
Target
3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe
-
Size
2.0MB
-
MD5
a12859823d43c0f050fac42ff3ca6850
-
SHA1
5cf9f15203a41120e4e92ebd1681088c22a100dc
-
SHA256
3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82
-
SHA512
bb6be1663d506e9892a493690abe9e7c636b941f88b42d5bec0584ccf8b98970096f18d20520913abef0683738e25a9ba27d20848cc6a94bcd349475e068b8fa
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe -
Drops file in Program Files directory 64 IoCs
Processes:
3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files\Java\jre7\bin\klist.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler64.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files\Google\Chrome\Application\chrome.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files\Mozilla Firefox\firefox.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{66AD6684-A854-4BD3-AB9E-15AF98443D4D}\chrome_installer.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\7-Zip\7z.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File created C:\Program Files\7-Zip\7z.exe 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe$ 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe -
NTFS ADS 1 IoCs
Processes:
3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exepid process 1884 3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe"C:\Users\Admin\AppData\Local\Temp\3b14867db4b8692f481d5a9475fa3331656af41de2995a887a04240261aa0e82.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx