Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 00:40
Static task
static1
Behavioral task
behavioral1
Sample
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe
Resource
win10v2004-20220812-en
General
-
Target
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe
-
Size
223KB
-
MD5
6dfefdaaf5b50396d5d15b22144ba8b0
-
SHA1
a836af9b9d4c3313ca26ccfbaa07025279955301
-
SHA256
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6
-
SHA512
8f58c6ac39f1a284a5fe4321f6b7d867c64d2bcd1b38e0b337159899c258cbd726429e0e5d448ce01a4647b61e7ebae52cebb2001fb98b8e0df2be771fc1b05c
-
SSDEEP
3072:jp7kXNyzoU0AVKzyA6EfGo9dM+4cvZvI+NZq3zLG93CWkEH:jxCNa8AWfJ9UcvFI+NZ0LG93CoH
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/948-58-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral1/memory/948-60-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral1/memory/948-61-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral1/memory/948-63-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral1/memory/948-64-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral1/memory/948-73-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral1/memory/1352-84-0x0000000000080000-0x00000000000A9000-memory.dmp cryptone behavioral1/memory/1352-85-0x0000000000080000-0x00000000000A9000-memory.dmp cryptone behavioral1/memory/1352-86-0x0000000000080000-0x00000000000A9000-memory.dmp cryptone behavioral1/memory/948-102-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral1/memory/1324-103-0x0000000000120000-0x0000000000149000-memory.dmp cryptone -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exemspaint.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Eawawe = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Eawawe.exe" mspaint.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exemspaint.exedescription ioc process File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\D: mspaint.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\M: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.execf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exedescription pid process target process PID 240 set thread context of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 set thread context of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exesvchost.execf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exepid process 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe 1324 svchost.exe 1564 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exepid process 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exesvchost.execalc.exemspaint.exedescription pid process Token: SeDebugPrivilege 1564 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe Token: SeDebugPrivilege 1324 svchost.exe Token: SeDebugPrivilege 1904 calc.exe Token: SeDebugPrivilege 1352 mspaint.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.execf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exesvchost.execf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exedescription pid process target process PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 240 wrote to memory of 948 240 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 wrote to memory of 1324 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 948 wrote to memory of 1324 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 948 wrote to memory of 1324 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 948 wrote to memory of 1324 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 948 wrote to memory of 1324 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 948 wrote to memory of 1904 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 948 wrote to memory of 1904 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 948 wrote to memory of 1904 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 948 wrote to memory of 1904 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 948 wrote to memory of 1904 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 948 wrote to memory of 1904 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 1324 wrote to memory of 1352 1324 svchost.exe mspaint.exe PID 1324 wrote to memory of 1352 1324 svchost.exe mspaint.exe PID 1324 wrote to memory of 1352 1324 svchost.exe mspaint.exe PID 1324 wrote to memory of 1352 1324 svchost.exe mspaint.exe PID 1324 wrote to memory of 1352 1324 svchost.exe mspaint.exe PID 948 wrote to memory of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 wrote to memory of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 wrote to memory of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 wrote to memory of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 wrote to memory of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 wrote to memory of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 wrote to memory of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 wrote to memory of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 wrote to memory of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 948 wrote to memory of 1564 948 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 1564 wrote to memory of 1324 1564 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 1564 wrote to memory of 1324 1564 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 1564 wrote to memory of 1904 1564 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 1564 wrote to memory of 1904 1564 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 1564 wrote to memory of 1352 1564 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe mspaint.exe PID 1564 wrote to memory of 1352 1564 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\SysWOW64\mspaint.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1352 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564