Analysis
-
max time kernel
8s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 09:41
Static task
static1
Behavioral task
behavioral1
Sample
7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881.exe
Resource
win10v2004-20220812-en
General
-
Target
7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881.exe
-
Size
243KB
-
MD5
b276885e93fc03d0461f2b4e9c82cebb
-
SHA1
9d5de0b3bd266bcf8067b97142ff0624a3d0f9dd
-
SHA256
7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881
-
SHA512
1ddd787393ef6ae7ae07274a6ed58cfc35fdc4f695b106f05e12a7f7282bd0a4a812f601bb43888354d214c3196ce9677f9a0c59a6d2222f2abf488a89d8db97
-
SSDEEP
6144:AQ54Cf/5pp5FZZcjKXniuU/iO8kfEGaBjPNGoWyy:AQ5BfJ93dUmkmjP1Wy
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4816-133-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4776-134-0x0000000000400000-0x000000000049A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run KuAW3A!b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KuAW3A!b = "C:\\PROGRA~3\\KuAW3A!b.exe" KuAW3A!b.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\KuAW3A!b KuAW3A!b.exe File opened for modification C:\PROGRA~3\KuAW3A!b KuAW3A!b.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4816 7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4816 7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881.exe 4776 KuAW3A!b.exe 4776 KuAW3A!b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4776 4816 7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881.exe 82 PID 4816 wrote to memory of 4776 4816 7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881.exe 82 PID 4816 wrote to memory of 4776 4816 7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881.exe"C:\Users\Admin\AppData\Local\Temp\7eaabd39bf3edb0c11360480146774c585e4931a39ca7bf4df986ca4f7644881.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\PROGRA~3\KuAW3A!b.exeC:\PROGRA~3\KuAW3A!b.exe2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4776
-