Analysis
-
max time kernel
36s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 12:32
Static task
static1
Behavioral task
behavioral1
Sample
918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe
Resource
win10v2004-20220812-en
General
-
Target
918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe
-
Size
143KB
-
MD5
937a045f22268716ddf831261909a0d0
-
SHA1
ea90fdfeec6d86a30f2a402dd69051ff2d91e321
-
SHA256
918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f
-
SHA512
0e69dac5145643a02800c37b7875b7406a9099c95f0da703bbeb69123b6b8b57d2115d46af7529f9c386fa45e3c711f17ded5910774d8c1742054c4a6b90dff5
-
SSDEEP
3072:uVsUDpx0vbcHYMBsWTD8YasmPLjNHiYwjZrtK64Qdnos:uVsJc+WMYSPLjEdjZJn4Q
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Screen Saver Pro 3.1 = "C:\\Users\\Admin\\AppData\\Roaming\\ScreenSaverPro.scr" 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\T: svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1516 mspaint.exe 1516 mspaint.exe 1516 mspaint.exe 1516 mspaint.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 576 wrote to memory of 1956 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 26 PID 576 wrote to memory of 1956 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 26 PID 576 wrote to memory of 1956 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 26 PID 576 wrote to memory of 1956 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 26 PID 576 wrote to memory of 1956 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 26 PID 576 wrote to memory of 1956 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 26 PID 576 wrote to memory of 1956 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 26 PID 576 wrote to memory of 1640 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 27 PID 576 wrote to memory of 1640 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 27 PID 576 wrote to memory of 1640 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 27 PID 576 wrote to memory of 1640 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 27 PID 576 wrote to memory of 1640 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 27 PID 576 wrote to memory of 1640 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 27 PID 576 wrote to memory of 1640 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 27 PID 576 wrote to memory of 1640 576 918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe 27 PID 1956 wrote to memory of 1516 1956 svchost.exe 28 PID 1956 wrote to memory of 1516 1956 svchost.exe 28 PID 1956 wrote to memory of 1516 1956 svchost.exe 28 PID 1956 wrote to memory of 1516 1956 svchost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe"C:\Users\Admin\AppData\Local\Temp\918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe"3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
-
C:\Users\Admin\AppData\Local\Temp\918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe"C:\Users\Admin\AppData\Local\Temp\918a8bc0b19c1dd25e62212a96da3424c64260dbe44e317b04724e30e3bcd82f.exe"2⤵PID:1640
-