Analysis
-
max time kernel
130s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe
Resource
win10v2004-20220901-en
General
-
Target
b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe
-
Size
55KB
-
MD5
92e0de5a76ad4d299abaeca72d3cf084
-
SHA1
b7b7af1fbdbd9059e1c9c31c5e12b78922a533a2
-
SHA256
b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba
-
SHA512
85de735c51f30bfdfad897243a69aea96632dac3148488d97d475dcb497ceaee1a9dee74f2e1a2f643e6acb24648ff3bb77c67064c97cf0bf21c20cce9bdc412
-
SSDEEP
768:4JwThjRmkqQ25Eh/FRRhVf5vT+Gsk35BFqE1ZSP/0Fcr55w3WzOB+ZTEn:lEkqWjhb+Gxr1Q/+cr55r/Tc
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\49351 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\mspniuoa.scr" svchost.exe -
Deletes itself 1 IoCs
pid Process 832 svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\mspniuoa.scr svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1200 b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe 1200 b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 832 1200 b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe 27 PID 1200 wrote to memory of 832 1200 b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe 27 PID 1200 wrote to memory of 832 1200 b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe 27 PID 1200 wrote to memory of 832 1200 b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe"C:\Users\Admin\AppData\Local\Temp\b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe2⤵
- Adds policy Run key to start application
- Deletes itself
- Drops file in Program Files directory
PID:832
-