Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe
Resource
win10v2004-20220901-en
General
-
Target
489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe
-
Size
177KB
-
MD5
02a40e57a97267265d68961353398c17
-
SHA1
2bd7443c8ffb23ca9fab8faa6fa20d1b260b56cd
-
SHA256
489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f
-
SHA512
faa7b9ba87837e8735ce47b177cc8d1d2ca4f6c08b87e6496bb59746f829ea551712922cc2c5d8e7ce796a71b34c5cab09d1e4e7dbe69da8df908aaf96f5a274
-
SSDEEP
3072:+cnG9cqzpRwysqIW5xJSuix/33dmqqnsZdysdJzTFn2wVV:dycmRwpu5SxP3WntsdH2w3
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Windows\SysWOW64\runouce.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe -
Drops file in Program Files directory 31 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Uninstall.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\7-Zip\7z.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1812 wrote to memory of 884 1812 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe 28 PID 1812 wrote to memory of 884 1812 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe 28 PID 1812 wrote to memory of 884 1812 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe 28 PID 1812 wrote to memory of 884 1812 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe 28 PID 1812 wrote to memory of 884 1812 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe 28 PID 1812 wrote to memory of 884 1812 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe 28 PID 1812 wrote to memory of 884 1812 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe 28 PID 1812 wrote to memory of 1208 1812 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe 10 PID 1812 wrote to memory of 1208 1812 489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe"C:\Users\Admin\AppData\Local\Temp\489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe"C:\Users\Admin\AppData\Local\Temp\489453ebe5156939ecfdccbf85b3bf8bfda1402a905bcde8163520342dc41a0f.exe"3⤵PID:884
-
-