Analysis
-
max time kernel
59s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe
Resource
win10v2004-20220812-en
General
-
Target
eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe
-
Size
98KB
-
MD5
4784d817616034884608bc8e38476ff0
-
SHA1
405079ec854bfb284c2f392b528090b3a864d96e
-
SHA256
eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044
-
SHA512
923f48c3091ea9be12fd4940ef7c9f666e95c1b79469867bb19fa226718978ba452d0b0734169e96c70564d2bd67dcbe52f0f268f6093dbf1cb3860a61bf2cb2
-
SSDEEP
3072:d8DTOWuhe69/Xwwb5RUUgj0A+VgRZkAZBxn3FuS9DUd:dFW769vwwb5aUgj0A+qRnrxn19o
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon = "C:\\Windows\\TEMP\\services.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\msmmsgr = "C:\\Windows\\TEMP\\x\\services.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 912 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 31 -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1480 reg.exe 1228 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 912 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 912 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1712 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 28 PID 1492 wrote to memory of 1712 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 28 PID 1492 wrote to memory of 1712 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 28 PID 1492 wrote to memory of 1712 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 28 PID 1492 wrote to memory of 1780 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 30 PID 1492 wrote to memory of 1780 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 30 PID 1492 wrote to memory of 1780 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 30 PID 1492 wrote to memory of 1780 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 30 PID 1492 wrote to memory of 912 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 31 PID 1492 wrote to memory of 912 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 31 PID 1492 wrote to memory of 912 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 31 PID 1492 wrote to memory of 912 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 31 PID 1492 wrote to memory of 912 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 31 PID 1492 wrote to memory of 912 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 31 PID 1492 wrote to memory of 912 1492 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 31 PID 1780 wrote to memory of 1228 1780 cmd.exe 34 PID 1780 wrote to memory of 1228 1780 cmd.exe 34 PID 1780 wrote to memory of 1228 1780 cmd.exe 34 PID 1780 wrote to memory of 1228 1780 cmd.exe 34 PID 1712 wrote to memory of 1480 1712 cmd.exe 33 PID 1712 wrote to memory of 1480 1712 cmd.exe 33 PID 1712 wrote to memory of 1480 1712 cmd.exe 33 PID 1712 wrote to memory of 1480 1712 cmd.exe 33 PID 912 wrote to memory of 1276 912 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 15 PID 912 wrote to memory of 1276 912 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 15 PID 912 wrote to memory of 1276 912 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 15 PID 912 wrote to memory of 1276 912 eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe"C:\Users\Admin\AppData\Local\Temp\eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:1228
-
-
-
C:\Users\Admin\AppData\Local\Temp\eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exeC:\Users\Admin\AppData\Local\Temp\eeffad07e3eed9cfea5a5a5594d8dbdf8aecaa8b4a3b03282a362fcb83268044.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:912
-
-