Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26/10/2022, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
g6f4bm0tdm.exe
Resource
win7-20220901-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
g6f4bm0tdm.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
g6f4bm0tdm.exe
-
Size
223KB
-
MD5
9d2b9fd161fb18a5da322473c57cf394
-
SHA1
32b0687f52565168bf1e8e8e3693f44f70e2dd43
-
SHA256
d2861c70a69ae1328332929d40ac763e63bac543460c6f8be367fcf44c1f0ad5
-
SHA512
45db55aca3e02dc0905f3204c528f6d2601e3c10f893dfcedc0bb0e42068f1f6c8805107bfa79a4db82b778e298782459d10a792840f9f9404622a8ebf2cd2b9
-
SSDEEP
6144:TjJuur+/4W9nZJM21+WzY5UysAOlWZX/:PL+/4W9DHgsON
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\oyasumi = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\oyasumi.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1184 set thread context of 2040 1184 g6f4bm0tdm.exe 27 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1184 wrote to memory of 2040 1184 g6f4bm0tdm.exe 27 PID 1184 wrote to memory of 2040 1184 g6f4bm0tdm.exe 27 PID 1184 wrote to memory of 2040 1184 g6f4bm0tdm.exe 27 PID 1184 wrote to memory of 2040 1184 g6f4bm0tdm.exe 27 PID 1184 wrote to memory of 2040 1184 g6f4bm0tdm.exe 27 PID 1184 wrote to memory of 2040 1184 g6f4bm0tdm.exe 27 PID 1184 wrote to memory of 2040 1184 g6f4bm0tdm.exe 27 PID 1184 wrote to memory of 2040 1184 g6f4bm0tdm.exe 27 PID 1184 wrote to memory of 2040 1184 g6f4bm0tdm.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\g6f4bm0tdm.exe"C:\Users\Admin\AppData\Local\Temp\g6f4bm0tdm.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
PID:2040
-