Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 19:25
Static task
static1
Behavioral task
behavioral1
Sample
bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe
Resource
win10v2004-20220812-en
General
-
Target
bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe
-
Size
236KB
-
MD5
0371732ffa8872a148e4877c65f2c30c
-
SHA1
a741040c2b93ec0e6130a8490c72db2eea1e1fdb
-
SHA256
bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe
-
SHA512
fe76c236c939914cba0d90166e8bebb33d18112ee936b32a2159424d6d24fc28b5a14b910c249e6995761ece20e33312448eb08016988e41f2d7fd1eec7b8694
-
SSDEEP
6144:Nl3d7WDugvM2ZmzpYEa7O5HVWYsRcuZpu8llsUiD:fN7WSgvM28zw7AMpRbZpu8T9iD
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360Ö÷¶¯·ÀÓù = "C:WINDOWS\\SHELLNEW\\sever.exe" reg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1652 bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1232 1652 bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe 28 PID 1652 wrote to memory of 1232 1652 bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe 28 PID 1652 wrote to memory of 1232 1652 bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe 28 PID 1652 wrote to memory of 1232 1652 bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe 28 PID 1232 wrote to memory of 948 1232 cmd.exe 30 PID 1232 wrote to memory of 948 1232 cmd.exe 30 PID 1232 wrote to memory of 948 1232 cmd.exe 30 PID 1232 wrote to memory of 948 1232 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe"C:\Users\Admin\AppData\Local\Temp\bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 360Ö÷¶¯·ÀÓù /d C:WINDOWS\SHELLNEW\sever.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 360Ö÷¶¯·ÀÓù /d C:WINDOWS\SHELLNEW\sever.exe /f3⤵
- Adds Run key to start application
PID:948
-
-