Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:01
Static task
static1
Behavioral task
behavioral1
Sample
d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe
Resource
win10v2004-20220901-en
General
-
Target
d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe
-
Size
200KB
-
MD5
917928febb4a1c1cac116fa4bc019ce6
-
SHA1
a3b239577938b82b16a27a203e7ee85db4eb0389
-
SHA256
d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f
-
SHA512
ddcaa1dc23321381d9d918359359a3ec2458f1733fad9515fdad1b4e4d4f0d3cd9e34b55c844c4eee7062c725378e63649deb6066c2b34fa82e9d90e8be08bc3
-
SSDEEP
3072:L2q25gnnh5WaadWiSrd8H2ckFXjcb0a+UqDp7xhDnCQ6scVpE0aD/JGwBQl19GSu:Lz25gnnh5LadmjcbAUAp7xhDnM/qDibu
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exenotepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fkooot = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Fkooot.exe" notepad.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exenotepad.exedescription ioc process File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\S: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exed2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exedescription pid process target process PID 4284 set thread context of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4752 set thread context of 3980 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exesvchost.exed2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exepid process 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe 4028 svchost.exe 4028 svchost.exe 3980 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe 3980 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe 3980 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exepid process 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.execalc.exesvchost.exenotepad.exedescription pid process Token: SeDebugPrivilege 3980 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe Token: SeDebugPrivilege 4244 calc.exe Token: SeDebugPrivilege 4028 svchost.exe Token: SeDebugPrivilege 4152 notepad.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exed2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exesvchost.exed2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exedescription pid process target process PID 4284 wrote to memory of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4284 wrote to memory of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4284 wrote to memory of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4284 wrote to memory of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4284 wrote to memory of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4284 wrote to memory of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4284 wrote to memory of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4284 wrote to memory of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4284 wrote to memory of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4284 wrote to memory of 4752 4284 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4752 wrote to memory of 4028 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe svchost.exe PID 4752 wrote to memory of 4028 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe svchost.exe PID 4752 wrote to memory of 4028 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe svchost.exe PID 4752 wrote to memory of 4028 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe svchost.exe PID 4752 wrote to memory of 4244 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe calc.exe PID 4752 wrote to memory of 4244 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe calc.exe PID 4752 wrote to memory of 4244 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe calc.exe PID 4752 wrote to memory of 4244 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe calc.exe PID 4752 wrote to memory of 4244 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe calc.exe PID 4028 wrote to memory of 4152 4028 svchost.exe notepad.exe PID 4028 wrote to memory of 4152 4028 svchost.exe notepad.exe PID 4028 wrote to memory of 4152 4028 svchost.exe notepad.exe PID 4028 wrote to memory of 4152 4028 svchost.exe notepad.exe PID 4752 wrote to memory of 3980 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4752 wrote to memory of 3980 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4752 wrote to memory of 3980 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4752 wrote to memory of 3980 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4752 wrote to memory of 3980 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4752 wrote to memory of 3980 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4752 wrote to memory of 3980 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4752 wrote to memory of 3980 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 4752 wrote to memory of 3980 4752 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe PID 3980 wrote to memory of 4244 3980 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe calc.exe PID 3980 wrote to memory of 4244 3980 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe calc.exe PID 3980 wrote to memory of 4028 3980 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe svchost.exe PID 3980 wrote to memory of 4028 3980 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe svchost.exe PID 3980 wrote to memory of 4152 3980 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe notepad.exe PID 3980 wrote to memory of 4152 3980 d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe"C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe"C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4152 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe"C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3980