Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 10:07
Static task
static1
Behavioral task
behavioral1
Sample
46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe
Resource
win10v2004-20220414-en
General
-
Target
46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe
-
Size
268KB
-
MD5
809ff40a9619745b5e753168d638a100
-
SHA1
2465e77e211ab7f88d2c7d61af5f5e2a7f8d5f5a
-
SHA256
46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634
-
SHA512
dc9bee27760392ccbfaf6eba89d83501babe0900e32555fdeec05b25c33f1c95097d379ad5d51a094613a1288f51678c8f9cef5979245ffd0f02edafbec98745
Malware Config
Extracted
gootkit
410
parking.dynophyl.com
parked.dynonortheast.com
trktrk.eu
smeinsurances.co.uk
-
vendor_id
410
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1220 cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mstsc.exepid process 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe 2016 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exepid process 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exepid process 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exemstsc.execmd.exedescription pid process target process PID 284 wrote to memory of 2016 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe mstsc.exe PID 284 wrote to memory of 2016 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe mstsc.exe PID 284 wrote to memory of 2016 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe mstsc.exe PID 284 wrote to memory of 2016 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe mstsc.exe PID 284 wrote to memory of 2016 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe mstsc.exe PID 284 wrote to memory of 2016 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe mstsc.exe PID 284 wrote to memory of 2016 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe mstsc.exe PID 284 wrote to memory of 2016 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe mstsc.exe PID 284 wrote to memory of 2016 284 46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe mstsc.exe PID 2016 wrote to memory of 1220 2016 mstsc.exe cmd.exe PID 2016 wrote to memory of 1220 2016 mstsc.exe cmd.exe PID 2016 wrote to memory of 1220 2016 mstsc.exe cmd.exe PID 2016 wrote to memory of 1220 2016 mstsc.exe cmd.exe PID 1220 wrote to memory of 1972 1220 cmd.exe attrib.exe PID 1220 wrote to memory of 1972 1220 cmd.exe attrib.exe PID 1220 wrote to memory of 1972 1220 cmd.exe attrib.exe PID 1220 wrote to memory of 1972 1220 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe"C:\Users\Admin\AppData\Local\Temp\46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\mstsc.exeC:\Windows\System32\mstsc.exe "C:\Users\Admin\AppData\Local\Temp\46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7112069.bat" "C:\Users\Admin\AppData\Local\Temp\46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe""3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\46041271b0d9461b5dab77b643ae0cd3195f227c677504a7b485497f1c5a7634.exe"4⤵
- Views/modifies file attributes
PID:1972
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5f1ea40a1834566cfe7c1107a90c525c6
SHA1f26e722b6645b8089ec61d68610703d6d579c13d
SHA25674798a0304625bb7030dc6e8bdd746495f572f3463413376632d59ec29f48865
SHA5124539da72f35500ef55ac3c04fc55c00f5f5b0375eccea6ab7b92ccc9f23ee2d47aa0d31220ad0c7033d4d09c0c2cc845d5517c8f8a36c9792027b6c5a7143b50