Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe
Resource
win10v2004-20220901-en
General
-
Target
de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe
-
Size
100KB
-
MD5
6a069d49f1eeef0fd12b2095c9174e42
-
SHA1
598ed606248c083bbffb668b00bb55126e0ab4f4
-
SHA256
de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f
-
SHA512
fa46b08583d2a3d0ff63262570887fb97d0b1538795aa4e0612b6d351875b91554c2f77bdb3cc5b4bfe3ab61c77bc9218553141fc1cf6921058e656428c8fe8e
-
SSDEEP
1536:7HUHWhVMPNzMh0QpFZyOSAYZRx6ik9ld8rAzt3i6EBXlLOUp:I9k0QpFZyOSAYZRx6iDrhLOUp
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Updates = "D:\\Updates.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\software\microsoft\windows\currentversion\run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Backup = "D:\\Backup.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\software\microsoft\windows\currentversion\run reg.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 852 reg.exe 1324 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4376 de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4968 4376 de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe 82 PID 4376 wrote to memory of 4968 4376 de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe 82 PID 4376 wrote to memory of 4968 4376 de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe 82 PID 4376 wrote to memory of 4980 4376 de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe 83 PID 4376 wrote to memory of 4980 4376 de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe 83 PID 4376 wrote to memory of 4980 4376 de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe 83 PID 4980 wrote to memory of 852 4980 cmd.exe 86 PID 4980 wrote to memory of 852 4980 cmd.exe 86 PID 4980 wrote to memory of 852 4980 cmd.exe 86 PID 4968 wrote to memory of 1324 4968 cmd.exe 87 PID 4968 wrote to memory of 1324 4968 cmd.exe 87 PID 4968 wrote to memory of 1324 4968 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe"C:\Users\Admin\AppData\Local\Temp\de49d7158104096ac628c50715025cd04444a388bae291545ad459e15a18ff3f.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\cmd.execmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\reg.exereg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1324
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\reg.exereg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:852
-
-