Analysis
-
max time kernel
8s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 06:28
Static task
static1
Behavioral task
behavioral1
Sample
37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe
Resource
win10v2004-20220812-en
General
-
Target
37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe
-
Size
470KB
-
MD5
4059ac5a074f671ea169545be44b7c8b
-
SHA1
0ece7afee5fe702129c44f1f0e5b3e560c181101
-
SHA256
37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3
-
SHA512
fd187f2f300cce54f653b97aa64ab018710b943ae84ef8f86a1c6d2d5be438b54e272df6a2713a5f03573d4f8df8442d03d3c199bfcf72650dd2c652e40e5f68
-
SSDEEP
6144:10ASTRxIXnkixpOv5KF5nThYMBTRHROIr4Kdyj7XKUTa8m23d7KJqKWMJcjo+eCm:109V/ai0FNHVI7XHgZQKhJgeCmi
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" 37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe 37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe File opened for modification C:\Windows\SysWOW64\runouce.exe 37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1800 wrote to memory of 968 1800 37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe 27 PID 1800 wrote to memory of 968 1800 37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe 27 PID 1800 wrote to memory of 968 1800 37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe 27 PID 1800 wrote to memory of 968 1800 37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe 27 PID 1800 wrote to memory of 1268 1800 37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe 15 PID 1800 wrote to memory of 1268 1800 37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe"C:\Users\Admin\AppData\Local\Temp\37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe"C:\Users\Admin\AppData\Local\Temp\37e5660b4eefb12a0f9e75717a0b3dc2b4ecd18b0e093a95e0ff7783646519d3.exe"2⤵PID:968
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268