Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 00:40
Static task
static1
Behavioral task
behavioral1
Sample
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe
Resource
win10v2004-20220812-en
General
-
Target
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe
-
Size
223KB
-
MD5
6dfefdaaf5b50396d5d15b22144ba8b0
-
SHA1
a836af9b9d4c3313ca26ccfbaa07025279955301
-
SHA256
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6
-
SHA512
8f58c6ac39f1a284a5fe4321f6b7d867c64d2bcd1b38e0b337159899c258cbd726429e0e5d448ce01a4647b61e7ebae52cebb2001fb98b8e0df2be771fc1b05c
-
SSDEEP
3072:jp7kXNyzoU0AVKzyA6EfGo9dM+4cvZvI+NZq3zLG93CWkEH:jxCNa8AWfJ9UcvFI+NZ0LG93CoH
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3896-134-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral2/memory/3896-141-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral2/memory/4176-142-0x0000000000D30000-0x0000000000D59000-memory.dmp cryptone behavioral2/memory/640-144-0x0000000001040000-0x0000000001069000-memory.dmp cryptone behavioral2/memory/640-143-0x0000000001040000-0x0000000001069000-memory.dmp cryptone behavioral2/memory/640-145-0x0000000001040000-0x0000000001069000-memory.dmp cryptone behavioral2/memory/3896-150-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral2/memory/4176-154-0x0000000000D30000-0x0000000000D59000-memory.dmp cryptone -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exemspaint.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rhqlqc = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Rhqlqc.exe" mspaint.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exemspaint.exedescription ioc process File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\D: mspaint.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\O: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.execf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exedescription pid process target process PID 4688 set thread context of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3896 set thread context of 3476 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exesvchost.execf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exepid process 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe 4176 svchost.exe 4176 svchost.exe 3476 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe 3476 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe 3476 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exepid process 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exesvchost.execalc.exemspaint.exedescription pid process Token: SeDebugPrivilege 3476 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe Token: SeDebugPrivilege 4176 svchost.exe Token: SeDebugPrivilege 4028 calc.exe Token: SeDebugPrivilege 640 mspaint.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.execf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exesvchost.execf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exedescription pid process target process PID 4688 wrote to memory of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 4688 wrote to memory of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 4688 wrote to memory of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 4688 wrote to memory of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 4688 wrote to memory of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 4688 wrote to memory of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 4688 wrote to memory of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 4688 wrote to memory of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 4688 wrote to memory of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 4688 wrote to memory of 3896 4688 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3896 wrote to memory of 4176 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 3896 wrote to memory of 4176 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 3896 wrote to memory of 4176 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 3896 wrote to memory of 4176 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 3896 wrote to memory of 4028 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 3896 wrote to memory of 4028 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 3896 wrote to memory of 4028 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 3896 wrote to memory of 4028 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 3896 wrote to memory of 4028 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 4176 wrote to memory of 640 4176 svchost.exe mspaint.exe PID 4176 wrote to memory of 640 4176 svchost.exe mspaint.exe PID 4176 wrote to memory of 640 4176 svchost.exe mspaint.exe PID 4176 wrote to memory of 640 4176 svchost.exe mspaint.exe PID 3896 wrote to memory of 3476 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3896 wrote to memory of 3476 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3896 wrote to memory of 3476 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3896 wrote to memory of 3476 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3896 wrote to memory of 3476 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3896 wrote to memory of 3476 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3896 wrote to memory of 3476 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3896 wrote to memory of 3476 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3896 wrote to memory of 3476 3896 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe PID 3476 wrote to memory of 4176 3476 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 3476 wrote to memory of 4176 3476 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe svchost.exe PID 3476 wrote to memory of 4028 3476 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 3476 wrote to memory of 4028 3476 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe calc.exe PID 3476 wrote to memory of 640 3476 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe mspaint.exe PID 3476 wrote to memory of 640 3476 cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\SysWOW64\mspaint.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"C:\Users\Admin\AppData\Local\Temp\cf23e914d1f70edb1b9fdcc995431c6310fa023565b3e96d1cf4dac84bc3dcd6.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3476