Analysis
-
max time kernel
154s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 19:32
Static task
static1
Behavioral task
behavioral1
Sample
704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe
Resource
win7-20220718-en
windows7-x64
4 signatures
150 seconds
General
-
Target
704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe
-
Size
191KB
-
MD5
3c413d0ce7376823e40a0a2d6360ec36
-
SHA1
1a58304f05fcd4cd42758978fac8999db13ef862
-
SHA256
704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2
-
SHA512
d9b079895e47e4ec49013e1b54d2013418b04247c0a2ab465af374f8ffa21c50a3f4235c75d61777db56de4da0409109e030de6ebc8144558fccd8dff2ba5510
Malware Config
Extracted
Family
gootkit
Botnet
2860
C2
adp.reevesandcompany.com
picturecrafting.site
Attributes
-
vendor_id
2860
Signatures
-
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exepid process 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exedescription pid process target process PID 4532 wrote to memory of 1544 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe PID 4532 wrote to memory of 1544 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe PID 4532 wrote to memory of 1544 4532 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe 704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe"C:\Users\Admin\AppData\Local\Temp\704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe"1⤵
- Modifies Internet Explorer Protected Mode
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exeC:\Users\Admin\AppData\Local\Temp\704ae96ace7072fa4cff2ad775286ec2654c4b07b31a1e5767e06847e75f45b2.exe --vwxyz2⤵PID:1544
-