Analysis
-
max time kernel
141s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe
Resource
win10v2004-20220812-en
General
-
Target
22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe
-
Size
48KB
-
MD5
db0eb1261e3d94426a55feb45e49f32f
-
SHA1
368a8a54ae9c84bae7e0ad8d3bbd63dfd879ba68
-
SHA256
22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa
-
SHA512
5fc3d7a1632f8daebe2ebf52b98d8e5203d63ae6bcbb0411dc755be6da3987e17c136798b7feb8390e2e55b32408dc7d4dc300d4404839eb2f950259e51b94b2
-
SSDEEP
384:o+dFOwTlk5EwEUwv8Qy17skYqX0LiTdxL+qCoLEZMSRbzFblq0Wdt1TyJgxwt9Ip:o+WGXvry7RhELi3+dDRt6yJywtgCM
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E94A2FC9-6A95-89B2-E595-4FB279ED81D2} 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E94A2FC9-6A95-89B2-E595-4FB279ED81D2}\stubpath = "%SystemRoot%\\system32\\V3Medic.exe" 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\V3Medic.exe 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe File opened for modification C:\Windows\SysWOW64\V3Medic.exe 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1280 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1280 wrote to memory of 4504 1280 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe 89 PID 1280 wrote to memory of 4504 1280 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe 89 PID 1280 wrote to memory of 4504 1280 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe 89 PID 1280 wrote to memory of 4916 1280 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe 94 PID 1280 wrote to memory of 4916 1280 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe 94 PID 1280 wrote to memory of 4916 1280 22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe"C:\Users\Admin\AppData\Local\Temp\22c3c783792f00a93693213a03f2611a090583aee0fac4ac66bf233dce4ac3aa.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{E94A2FC9-6A95-89B2-E595-4FB279ED81D2}" /f2⤵PID:4504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\22C3C7~1.EXE > nul2⤵PID:4916
-