Analysis
-
max time kernel
149s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe
Resource
win10v2004-20220812-en
General
-
Target
55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe
-
Size
260KB
-
MD5
17bffb7fb0dd124daef36c94f5a9f628
-
SHA1
bcf29c09abf7d3d2129fe7a94edec01af225cb79
-
SHA256
55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8
-
SHA512
a186adf4e16245fb26d1758bf5e53540e5e90cc927e606496989762f6b0b9d527fd64157082baebc6bde7371dca7b838df55f04756387ce5dce3a08452b6b6c8
-
SSDEEP
1536:GM3i6EBXR2n7dqnfiVDIHMPV0+l/SLOUprPCo5bp9NLW2n7dqnfiVDIHMPV0+l/K:TeiVD+EmUSLOUprPTbp9NLteiVD+EmU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Firewall7 = "c:\\users\\public\\iexplore.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchhost7 = "c:\\users\\public\\svchhost.exe" reg.exe -
Enumerates connected drives 3 TTPs 11 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe File opened (read-only) \??\h: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe File opened (read-only) \??\j: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe File opened (read-only) \??\k: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe File opened (read-only) \??\m: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe File opened (read-only) \??\n: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe File opened (read-only) \??\e: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe File opened (read-only) \??\f: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe File opened (read-only) \??\o: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe File opened (read-only) \??\i: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe File opened (read-only) \??\l: 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2044 1948 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe 27 PID 1948 wrote to memory of 2044 1948 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe 27 PID 1948 wrote to memory of 2044 1948 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe 27 PID 1948 wrote to memory of 2044 1948 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe 27 PID 1948 wrote to memory of 852 1948 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe 29 PID 1948 wrote to memory of 852 1948 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe 29 PID 1948 wrote to memory of 852 1948 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe 29 PID 1948 wrote to memory of 852 1948 55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe"C:\Users\Admin\AppData\Local\Temp\55e55d66cd5963e15f5d16e2763e5973d7cdf109ee897f9491386ec111aad2c8.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\ /v Firewall7 /t REG_SZ /d c:\users\public\iexplore.exe /f2⤵
- Adds Run key to start application
PID:2044
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\ /v svchhost7 /t REG_SZ /d c:\users\public\svchhost.exe /f2⤵
- Adds Run key to start application
PID:852
-