Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
a130efba2912e6359ce86f25e7ae1a52a7f3176752bf14b39c9c277f6d8b6d78.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a130efba2912e6359ce86f25e7ae1a52a7f3176752bf14b39c9c277f6d8b6d78.exe
Resource
win10v2004-20220812-en
General
-
Target
a130efba2912e6359ce86f25e7ae1a52a7f3176752bf14b39c9c277f6d8b6d78.exe
-
Size
96KB
-
MD5
70f791cc0fc1d02883328038dd5f4b00
-
SHA1
7b71e389a251b56761a17d2dab326848dacb06b8
-
SHA256
a130efba2912e6359ce86f25e7ae1a52a7f3176752bf14b39c9c277f6d8b6d78
-
SHA512
fb3f378fb6cabb733ce9a83a15f17181fe474070f0bd12bb221a3b79e82b6303e53b42b1e213eab988c0046bf99ceac096e8410964deb442e8f68d3393711f6c
-
SSDEEP
1536:r5Q/1ioFXIH3CH+5/9cz4veQOBOtLKCDyd8NKbWK43yRgY9+WgkfS6wl09tE5N9J:r5+igXoyecz4veQOBO9DsbWK43LYEkf0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\skype.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1340 a130efba2912e6359ce86f25e7ae1a52a7f3176752bf14b39c9c277f6d8b6d78.exe 820 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1340 a130efba2912e6359ce86f25e7ae1a52a7f3176752bf14b39c9c277f6d8b6d78.exe 1340 a130efba2912e6359ce86f25e7ae1a52a7f3176752bf14b39c9c277f6d8b6d78.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a130efba2912e6359ce86f25e7ae1a52a7f3176752bf14b39c9c277f6d8b6d78.exe"C:\Users\Admin\AppData\Local\Temp\a130efba2912e6359ce86f25e7ae1a52a7f3176752bf14b39c9c277f6d8b6d78.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:1340
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:820