Analysis
-
max time kernel
177s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:50
Static task
static1
Behavioral task
behavioral1
Sample
da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe
Resource
win10v2004-20221111-en
General
-
Target
da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe
-
Size
138KB
-
MD5
59d3081944280095f737160486112a0d
-
SHA1
25b47ff668399bbd892425e1c659b75b88fe777f
-
SHA256
da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364
-
SHA512
282190fde05b62ab74712a53105b5333e4eb715d115b97f57bcc08ca50723ce6e22df23f3a31187e3c3f0068de4606372db8e01c33646732c297732d88ad2dc6
-
SSDEEP
1536:WsE7irBuVju8HSJnegoSW1/LNVW9S2bM/AQSaZP5vNvFxiNAyH1vUK:k7QLJnelb1/LsS82AQZZRvNvPyVv
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
explorer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1724a1d.exe explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1724a1d = "C:\\Users\\Admin\\AppData\\Roaming\\1724a1d.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*724a1d = "C:\\Users\\Admin\\AppData\\Roaming\\1724a1d.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1724a1 = "C:\\1724a1d\\1724a1d.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*724a1 = "C:\\1724a1d\\1724a1d.exe" explorer.exe -
Drops file in Windows directory 1 IoCs
Processes:
da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exedescription ioc process File opened for modification C:\Windows\da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.INI da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exeexplorer.exepid process 1612 da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe 3760 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exepid process 1612 da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe 1612 da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exeexplorer.exedescription pid process target process PID 1612 wrote to memory of 3760 1612 da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe explorer.exe PID 1612 wrote to memory of 3760 1612 da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe explorer.exe PID 1612 wrote to memory of 3760 1612 da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe explorer.exe PID 3760 wrote to memory of 2368 3760 explorer.exe svchost.exe PID 3760 wrote to memory of 2368 3760 explorer.exe svchost.exe PID 3760 wrote to memory of 2368 3760 explorer.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe"C:\Users\Admin\AppData\Local\Temp\da7fa96e57a415d83dc4ff49ea843469a9fde81d07707ef5ffcba3f059b05364.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\svchost.exe-k netsvcs3⤵PID:2368