Analysis
-
max time kernel
66s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:49
Static task
static1
Behavioral task
behavioral1
Sample
16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175.exe
Resource
win10v2004-20220812-en
General
-
Target
16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175.exe
-
Size
115KB
-
MD5
d14ba65338b03255b0caf3b40b6bd76b
-
SHA1
16a261aa344eb9a23ce1090cc024f3f769de7c55
-
SHA256
16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175
-
SHA512
872882b6905b2c716faf0e34ae6da0425f9a48bc7a899e62bcf4d66930a13103bf77eba951ee8f930946b60868062f121d81f5d5c10aef484b8f80d8a49b2f87
-
SSDEEP
1536:eAB6uwU1FiJWT3GmA8oidfSz5TVgdjOb2RADCGAi8AijAi:eAQ/UTyGS8oeYvgdjWrlP8PjP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175.exesvchost.exepid process 276 16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175.exe 688 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175.exepid process 276 16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175.exe 276 16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175.exe"C:\Users\Admin\AppData\Local\Temp\16e23a73c5c7bc6672903c54c5bf75046082338ff8aed03668dee3beefe46175.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:276
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:688