Analysis
-
max time kernel
190s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:42
Static task
static1
Behavioral task
behavioral1
Sample
22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe
Resource
win10v2004-20221111-en
General
-
Target
22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe
-
Size
436KB
-
MD5
edefcbba2944872f31454fcb98802488
-
SHA1
27a690408678628d26f34c0e4ea8171c81e00e83
-
SHA256
22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b
-
SHA512
9544bf7c5cd78879941ae17751cba7c70da2e48845e6d6806a727e3f91ad56144e1623c196e7de238c38c594c436fd4ebff44b10647911a7e034dc8a819886aa
-
SSDEEP
6144:/PkChIG8KPZSgC2QObrRBgzjgMwP5lWQiobS+ODAqEo0BMe:UChIGphCUbrRSzkMwPPlVbMDpkL
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe" 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe -
Drops file in Windows directory 1 IoCs
Processes:
22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exedescription ioc process File opened for modification C:\Windows\22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.INI 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exepid process 2204 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe 2204 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe 2204 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe 2204 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe 2204 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 2020 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2020 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exepid process 2204 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exedescription pid process Token: SeDebugPrivilege 2204 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe Token: SeDebugPrivilege 2020 Token: SeShutdownPrivilege 2020 Token: SeCreatePagefilePrivilege 2020 Token: SeShutdownPrivilege 2020 Token: SeCreatePagefilePrivilege 2020 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exepid process 2204 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe 2204 22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe"C:\Users\Admin\AppData\Local\Temp\22a01bfd5d65a080bfee310d8cac3fa5167f62cc95a71b85f4c8a8cd8c3aed4b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2204