Analysis
-
max time kernel
27s -
max time network
3s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 21:34
Static task
static1
Behavioral task
behavioral1
Sample
ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe
Resource
win10v2004-20220812-en
General
-
Target
ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe
-
Size
404KB
-
MD5
0c92b8f9d2b6669fc927f6dd01d58b1d
-
SHA1
cea00b2aa6424a7373c6aba58e2a75fb4d8b40ed
-
SHA256
ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539
-
SHA512
68f7d36b9b9c4ca7c2d5190b00eef360cd864707a1fc1a1437a2cf25eef2fa14fefe4bbaa09d767cc00bfd5a75f0cf05b6aae0fe2583669d2cfda1e8c515df60
-
SSDEEP
6144:j2gwBlB8an7MrQYbUc6THBuTq7KvxgCoZ7WWlqwncr+wBdF7bDJG:662HYH6TBMq7KvxhoZC8n0+wBdFP1G
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe -
resource yara_rule behavioral2/memory/4280-139-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4280-140-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4280-137-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4280-142-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4280-144-0x0000000010410000-0x0000000010471000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe File opened for modification C:\Windows\SysWOW64\install\server.exe ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1992 set thread context of 4280 1992 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4280 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe 4280 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1992 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1992 wrote to memory of 4280 1992 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe 82 PID 1992 wrote to memory of 4280 1992 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe 82 PID 1992 wrote to memory of 4280 1992 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe 82 PID 1992 wrote to memory of 4280 1992 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe 82 PID 1992 wrote to memory of 4280 1992 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe 82 PID 1992 wrote to memory of 4280 1992 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe 82 PID 1992 wrote to memory of 4280 1992 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe 82 PID 1992 wrote to memory of 4280 1992 ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe"C:\Users\Admin\AppData\Local\Temp\ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exeC:\Users\Admin\AppData\Local\Temp\ed6b989816f760553406d40d1d707564d1108a7b1e40dd259986e221cd6ce539.exe2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4280 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4808
-
-