Analysis
-
max time kernel
25s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:48
Static task
static1
Behavioral task
behavioral1
Sample
84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7.exe
Resource
win10v2004-20221111-en
General
-
Target
84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7.exe
-
Size
57KB
-
MD5
b9cbbaa719520707bb167fd84f105ebe
-
SHA1
99476a8bd0a97a645374c930c24b8be177136930
-
SHA256
84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7
-
SHA512
f35d217bd5ecdb43bd52c6100ffa1a27f17623a762e6f5a599ec3682f71a736c78d48467f9a35dc7294c5561edc0a743a942c90046c94a9789f27bab94155272
-
SSDEEP
1536:Cw/2KIFR0+KfF7buHjkPegFd5YH2AcT/6g0advId:N/2ZnEqEUHdA6b/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\skype.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7.exesvchost.exepid process 844 84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7.exe 324 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7.exepid process 844 84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7.exe 844 84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7.exe"C:\Users\Admin\AppData\Local\Temp\84b63bc99543536ea3ca6855dfa244d35b49a8d43ad550baee7d655c84c0d2d7.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:844
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:324