Analysis
-
max time kernel
123s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
02-08-2022 00:33
Static task
static1
Behavioral task
behavioral1
Sample
5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe
Resource
win10v2004-20220721-en
General
-
Target
5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe
-
Size
254KB
-
MD5
0ef4fe312fdafc87b0f785e8e69c3ecf
-
SHA1
7ac2dc2560610f00859c83c33afab23553cb670b
-
SHA256
5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21
-
SHA512
2da6a733a8fc3063bf03852085fca6d279601f34cb41a07cec4999e61f5ebc9d3f75fa537027fb48c2f9cd098dc4d94636adf49be5fa3491846b3b311715312c
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\GUuzajq0tkqRWTX8J2W8ecEfgFcv.exe" 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exedescription pid process target process PID 1816 set thread context of 1612 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exeexplorer.exepid process 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe 1612 explorer.exe 1612 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exepid process 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exepid process 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 1612 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exedescription pid process target process PID 1816 wrote to memory of 1612 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe explorer.exe PID 1816 wrote to memory of 1612 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe explorer.exe PID 1816 wrote to memory of 1612 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe explorer.exe PID 1816 wrote to memory of 1612 1816 5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe"C:\Users\Admin\AppData\Local\Temp\5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-