Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:06
Static task
static1
Behavioral task
behavioral1
Sample
6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe
Resource
win10v2004-20220812-en
General
-
Target
6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe
-
Size
150KB
-
MD5
40ad08a727e110a5358e9de4e48beb8b
-
SHA1
ecfd82bf3918c0d24f3006c8f145366a452c6de0
-
SHA256
6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702
-
SHA512
a386d002d0f128117de98baf4578453eb518b9a6d21298661752356243d336c6f24806cd1531c356388e22dac77d09e154f27070cc8a0570720ef73858008200
-
SSDEEP
1536:N1O/esjj4EaaiLn/DZHBOgCXhUbkf1IPiK5NhCXhiIuOH5Y+q1jGJyVZGC86jOr8:NBmj4+yD143UO1UiEGL76+qFWyVg6R
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrgspvpf = "\"C:\\Users\\Admin\\AppData\\Local\\jvxwwear.exe\"" svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exepid process 1532 6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe 1532 6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exedescription pid process target process PID 1532 wrote to memory of 1044 1532 6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe svchost.exe PID 1532 wrote to memory of 1044 1532 6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe svchost.exe PID 1532 wrote to memory of 1044 1532 6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe"C:\Users\Admin\AppData\Local\Temp\6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Adds Run key to start application
PID:1044