Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe
Resource
win10v2004-20220812-en
General
-
Target
b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe
-
Size
125KB
-
MD5
20072e4a3a2090e5911903781d92c992
-
SHA1
e709630fc7e9b211c02726097ee8182467fa738d
-
SHA256
b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96
-
SHA512
4144f7efbe8eb8070696841df628b8b853740cbda13acc9b6e4ec9ddbb5431ac14f64d06d61656c2eecb468e4f270d692090bd970b7adc7fe411a759204ca181
-
SSDEEP
3072:Lnk0QpFZyOSAYZRx6iDrhLOUpGky7G96VXRs8e8zdrOAcFH/614:Lnk0lrTL96VqQpONwa
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Updates = "D:\\Updates.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\software\microsoft\windows\currentversion\run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Backup = "D:\\Backup.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\software\microsoft\windows\currentversion\run reg.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 4792 reg.exe 3556 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1064 b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1064 wrote to memory of 3472 1064 b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe 79 PID 1064 wrote to memory of 3472 1064 b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe 79 PID 1064 wrote to memory of 3472 1064 b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe 79 PID 1064 wrote to memory of 2436 1064 b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe 81 PID 1064 wrote to memory of 2436 1064 b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe 81 PID 1064 wrote to memory of 2436 1064 b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe 81 PID 3472 wrote to memory of 3556 3472 cmd.exe 84 PID 3472 wrote to memory of 3556 3472 cmd.exe 84 PID 3472 wrote to memory of 3556 3472 cmd.exe 84 PID 2436 wrote to memory of 4792 2436 cmd.exe 83 PID 2436 wrote to memory of 4792 2436 cmd.exe 83 PID 2436 wrote to memory of 4792 2436 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe"C:\Users\Admin\AppData\Local\Temp\b8faa9bc8e452121f27c820c56736dc14f7f2d6b1e47a58f110aea24bf3d8e96.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\cmd.execmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\reg.exereg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:3556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\reg.exereg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4792
-
-