Analysis
-
max time kernel
4s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe
Resource
win10v2004-20220812-en
General
-
Target
b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe
-
Size
373KB
-
MD5
34c5edb71fd9a5e839440678175663d0
-
SHA1
92f8f25f56c80209dc96373ae171c52c1d3edb7e
-
SHA256
b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd
-
SHA512
0c67fb59e29643f2c3de2ea2df99355c0cc8572aa02101f4c4a9588a69e50f03f36616f6a76050757a2b61864584821d012548a69cef57f03dc617d62931d307
-
SSDEEP
6144:5731bdBaBFyzNymBLppBItEtFbA6au+wmSOJR/Omqi4h133QnTS2oF7WQTGP:51bfNymbpBItEXsSOSNmq9HQnIFiQT+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\FlickLearningWizard.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File created C:\Windows\SysWOW64\xdccPrograms\InkWatson.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InkWatson.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File created C:\Windows\SysWOW64\xdccPrograms\InputPersonalization.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InputPersonalization.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File created C:\Windows\SysWOW64\xdccPrograms\mip.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File created C:\Windows\SysWOW64\xdccPrograms\ConvertInkStore.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\RCXD431.tmp b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File created C:\Windows\SysWOW64\xdccPrograms\FlickLearningWizard.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\ConvertInkStore.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File created C:\Windows\SysWOW64\sIRC4.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1320 908 WerFault.exe 23 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 908 wrote to memory of 1320 908 b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe 28 PID 908 wrote to memory of 1320 908 b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe 28 PID 908 wrote to memory of 1320 908 b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe 28 PID 908 wrote to memory of 1320 908 b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe"C:\Users\Admin\AppData\Local\Temp\b6f5a198d49308b99fd243e9e38114c4394b188a9c91e906db4c86a4f13e08cd.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 1522⤵
- Program crash
PID:1320
-