Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 12:42
Static task
static1
Behavioral task
behavioral1
Sample
7cf72f770ac3613a3410d6cef74d9cc5dbd239535770662ea1070df6afefc1f4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7cf72f770ac3613a3410d6cef74d9cc5dbd239535770662ea1070df6afefc1f4.exe
Resource
win10v2004-20220812-en
General
-
Target
7cf72f770ac3613a3410d6cef74d9cc5dbd239535770662ea1070df6afefc1f4.exe
-
Size
108KB
-
MD5
a2f4e51fe461378ef4b2cf706a0c5030
-
SHA1
4839e8fec3327460ec4f5e9e117829016ed791aa
-
SHA256
7cf72f770ac3613a3410d6cef74d9cc5dbd239535770662ea1070df6afefc1f4
-
SHA512
ef024d95002dfc35ceb4578e20dda8c44eba9b663aed83d7d103b021f2f4e1e55674d193268aba965d0bf520973c94fe4eb5e623374bb23083f07a97e0f6c136
-
SSDEEP
1536:FZlAv1IpcqNRYcQOJ7co+ZJSecHek8cqvY9B/xKPkdWOfGCC6ENN3KqWf7C:c13wRYcFco+JVAezFxeWOuj/aqWTC
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\skype.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1228 7cf72f770ac3613a3410d6cef74d9cc5dbd239535770662ea1070df6afefc1f4.exe 1720 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1228 7cf72f770ac3613a3410d6cef74d9cc5dbd239535770662ea1070df6afefc1f4.exe 1228 7cf72f770ac3613a3410d6cef74d9cc5dbd239535770662ea1070df6afefc1f4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cf72f770ac3613a3410d6cef74d9cc5dbd239535770662ea1070df6afefc1f4.exe"C:\Users\Admin\AppData\Local\Temp\7cf72f770ac3613a3410d6cef74d9cc5dbd239535770662ea1070df6afefc1f4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:1228
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1720