Analysis
-
max time kernel
5s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 04:04
Static task
static1
Behavioral task
behavioral1
Sample
b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe
Resource
win10v2004-20220721-en
General
-
Target
b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe
-
Size
556KB
-
MD5
3b853488166717cfa0496456d5672cef
-
SHA1
d480377e348da926387f38b2a1c68dc08121740a
-
SHA256
b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186
-
SHA512
25ed7a6848aae6e1796eae5249cabfa830ea86b27d5a149593cdcd13717f149058b0ea5083e1126e8fad7af238922fa961c442eee02ee8994979bf1a00bea3f3
Malware Config
Signatures
-
suricata: ET MALWARE Onkods.A Downloader Checkin
suricata: ET MALWARE Onkods.A Downloader Checkin
-
Downloads MZ/PE file
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exesvchost.exedescription pid process Token: SeLoadDriverPrivilege 1592 svchost.exe Token: SeLoadDriverPrivilege 1592 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exeb017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exepid process 4340 b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe 4340 b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe 4340 b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe 4340 b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe"C:\Users\Admin\AppData\Local\Temp\b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe"C:\Users\Admin\AppData\Local\Temp\b017fcfb1afb809fb3d0e50c5a7bf00c5534b19c417b6b811f8dc87674394186.exe"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken