Analysis
-
max time kernel
194s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:38
Static task
static1
Behavioral task
behavioral1
Sample
fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe
Resource
win10v2004-20221111-en
General
-
Target
fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe
-
Size
178KB
-
MD5
10a1d3076e341bc58eb877812af28831
-
SHA1
4ac987f8d220168d089d86f3e47810f67fb4c889
-
SHA256
fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9
-
SHA512
9f45ef560a8e3091d232032656810f31521ae7913fe5a437d80b3065e791decf5722c70a9283f19bb59acb3ad1508d2cdaf3535fcf85c564b85fb0f364e93579
-
SSDEEP
3072:ovbnG14mgBkAV7y9rwOWqdIQhY4IC4ilDG0UQ2Vf8RjPrd:AGGkAc9tdIOYC4iFUQ2BAzrd
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{94b51c16-0cef-92dd-5e85-d337991aa9a5}\\n." fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe -
Unexpected DNS network traffic destination 8 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 91.193.74.13 Destination IP 91.193.74.13 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 91.193.74.13 Destination IP 91.193.74.13 -
Modifies registry class 5 IoCs
Processes:
fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\clsid fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1} fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{94b51c16-0cef-92dd-5e85-d337991aa9a5}\\n." fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exepid process 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2628 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Token: SeDebugPrivilege 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Token: SeDebugPrivilege 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE Token: SeShutdownPrivilege 2628 Explorer.EXE Token: SeCreatePagefilePrivilege 2628 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 2628 Explorer.EXE 2628 Explorer.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exedescription pid process target process PID 1788 wrote to memory of 2628 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Explorer.EXE PID 1788 wrote to memory of 2628 1788 fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe"C:\Users\Admin\AppData\Local\Temp\fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe"2⤵
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788