Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe
Resource
win10v2004-20220901-en
General
-
Target
1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe
-
Size
61KB
-
MD5
04ceaae394b5c0f19a715ee4d23d7bda
-
SHA1
3298b8bf64834fd237512edace89d6b2e8acbeec
-
SHA256
1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa
-
SHA512
dc33877c99a7e9e97871225a08f4eb7d4011d9b2012657467a50754d04ad9f3aded7717d27c338a95ad34c0cbc15ad43d006d7c61db29ce1c5b918fb7b2d70b3
-
SSDEEP
1536:KMQKzwcnBIO+k7u7rVWiktMUeAATwJBnKAi2t:5DzwcnP7u7rVWikKUeAAUJ9Ke
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Serverx = "C:\\Windows\\system32\\Serverx.exe" 1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Serverx.exe 1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe File opened for modification C:\Windows\SysWOW64\Serverx.exe 1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1756 wrote to memory of 916 1756 1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe 27 PID 1756 wrote to memory of 916 1756 1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe 27 PID 1756 wrote to memory of 916 1756 1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe 27 PID 1756 wrote to memory of 916 1756 1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe 27 PID 1756 wrote to memory of 1396 1756 1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe 11 PID 1756 wrote to memory of 1396 1756 1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe"C:\Users\Admin\AppData\Local\Temp\1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe"C:\Users\Admin\AppData\Local\Temp\1e7acd3951926ecc626a905a7f907be82489370dd6fc23ec5255fc294add65fa.exe"3⤵PID:916
-
-