Analysis
-
max time kernel
146s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:39
Static task
static1
Behavioral task
behavioral1
Sample
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe
Resource
win10v2004-20220901-en
General
-
Target
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe
-
Size
218KB
-
MD5
8cfa357a5ac5d288f54d74f7e30cadcd
-
SHA1
3a1205f2a30e68b715daefe68459ecb5bdae9164
-
SHA256
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b
-
SHA512
bb408ff48e7a00a88086625a350d90db29143168a60c258d050e74d071fa5cf465bd6a7e20299fe837d490bd68008b50df7246b51cc4bf2322c2991b14738321
-
SSDEEP
3072:sQsCOibMsuRUwy6DeCMdH2AYMsRPyqJkd6xO5UFXDV+2oF5IIU6h77OUjecgOZ/h:sFibMsidDeJdL8P5kg05w+2+O2eLVlY
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exenotepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kenhnr = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Kenhnr.exe" notepad.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exenotepad.exedescription ioc process File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\J: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exef9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exedescription pid process target process PID 1632 set thread context of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 set thread context of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exesvchost.exef9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exepid process 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe 1276 svchost.exe 1752 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exepid process 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exesvchost.execalc.exenotepad.exedescription pid process Token: SeDebugPrivilege 1752 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe Token: SeDebugPrivilege 1276 svchost.exe Token: SeDebugPrivilege 1712 calc.exe Token: SeDebugPrivilege 588 notepad.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exef9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exesvchost.exef9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exedescription pid process target process PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1632 wrote to memory of 904 1632 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 wrote to memory of 1276 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 904 wrote to memory of 1276 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 904 wrote to memory of 1276 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 904 wrote to memory of 1276 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 904 wrote to memory of 1712 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 904 wrote to memory of 1712 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 904 wrote to memory of 1712 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 904 wrote to memory of 1712 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 904 wrote to memory of 1712 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 904 wrote to memory of 1712 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 904 wrote to memory of 1276 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 1276 wrote to memory of 588 1276 svchost.exe notepad.exe PID 1276 wrote to memory of 588 1276 svchost.exe notepad.exe PID 1276 wrote to memory of 588 1276 svchost.exe notepad.exe PID 1276 wrote to memory of 588 1276 svchost.exe notepad.exe PID 1276 wrote to memory of 588 1276 svchost.exe notepad.exe PID 904 wrote to memory of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 wrote to memory of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 wrote to memory of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 wrote to memory of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 wrote to memory of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 wrote to memory of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 wrote to memory of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 wrote to memory of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 wrote to memory of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 904 wrote to memory of 1752 904 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 1752 wrote to memory of 1276 1752 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 1752 wrote to memory of 1276 1752 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 1752 wrote to memory of 1712 1752 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 1752 wrote to memory of 1712 1752 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 1752 wrote to memory of 588 1752 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe notepad.exe PID 1752 wrote to memory of 588 1752 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752
-
-