Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:39
Static task
static1
Behavioral task
behavioral1
Sample
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe
Resource
win10v2004-20220901-en
General
-
Target
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe
-
Size
218KB
-
MD5
8cfa357a5ac5d288f54d74f7e30cadcd
-
SHA1
3a1205f2a30e68b715daefe68459ecb5bdae9164
-
SHA256
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b
-
SHA512
bb408ff48e7a00a88086625a350d90db29143168a60c258d050e74d071fa5cf465bd6a7e20299fe837d490bd68008b50df7246b51cc4bf2322c2991b14738321
-
SSDEEP
3072:sQsCOibMsuRUwy6DeCMdH2AYMsRPyqJkd6xO5UFXDV+2oF5IIU6h77OUjecgOZ/h:sFibMsidDeJdL8P5kg05w+2+O2eLVlY
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exenotepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jrhjhs = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Jrhjhs.exe" notepad.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exenotepad.exedescription ioc process File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\S: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exef9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exedescription pid process target process PID 920 set thread context of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 4844 set thread context of 2044 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exesvchost.exef9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exepid process 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe 2260 svchost.exe 2260 svchost.exe 2044 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe 2044 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe 2044 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exepid process 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exesvchost.execalc.exenotepad.exedescription pid process Token: SeDebugPrivilege 2044 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe Token: SeDebugPrivilege 2260 svchost.exe Token: SeDebugPrivilege 1580 calc.exe Token: SeDebugPrivilege 2608 notepad.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exef9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exesvchost.exef9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exedescription pid process target process PID 920 wrote to memory of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 920 wrote to memory of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 920 wrote to memory of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 920 wrote to memory of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 920 wrote to memory of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 920 wrote to memory of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 920 wrote to memory of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 920 wrote to memory of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 920 wrote to memory of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 920 wrote to memory of 4844 920 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 4844 wrote to memory of 2260 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 4844 wrote to memory of 2260 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 4844 wrote to memory of 2260 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 4844 wrote to memory of 2260 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 4844 wrote to memory of 1580 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 4844 wrote to memory of 1580 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 4844 wrote to memory of 1580 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 4844 wrote to memory of 1580 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 4844 wrote to memory of 1580 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 2260 wrote to memory of 2608 2260 svchost.exe notepad.exe PID 2260 wrote to memory of 2608 2260 svchost.exe notepad.exe PID 2260 wrote to memory of 2608 2260 svchost.exe notepad.exe PID 2260 wrote to memory of 2608 2260 svchost.exe notepad.exe PID 4844 wrote to memory of 2044 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 4844 wrote to memory of 2044 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 4844 wrote to memory of 2044 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 4844 wrote to memory of 2044 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 4844 wrote to memory of 2044 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 4844 wrote to memory of 2044 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 4844 wrote to memory of 2044 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 4844 wrote to memory of 2044 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 4844 wrote to memory of 2044 4844 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe PID 2044 wrote to memory of 2260 2044 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 2044 wrote to memory of 2260 2044 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe svchost.exe PID 2044 wrote to memory of 1580 2044 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 2044 wrote to memory of 1580 2044 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe calc.exe PID 2044 wrote to memory of 2608 2044 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe notepad.exe PID 2044 wrote to memory of 2608 2044 f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"C:\Users\Admin\AppData\Local\Temp\f9c434625b0cfe2112cdaa7f819bbcee29ba23d04908276056f126db0b85a30b.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044
-
-