Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:50
Static task
static1
Behavioral task
behavioral1
Sample
81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe
Resource
win10v2004-20220901-en
General
-
Target
81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe
-
Size
548KB
-
MD5
2bc0356986bda4a28e16a5b8b137cc57
-
SHA1
1de52df17c2dd05362e0eccf22ebff49c3b81f58
-
SHA256
81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b
-
SHA512
235e794cdc7617c0bfb9b17944d1eb27212609067f92851588aa034c8d5f73b13fe0abc9c6952f6b39ef0fe467aa6a48918a432b52fbc42853212d9b7f4092b4
-
SSDEEP
12288:PVJpPb5vKVJDD3E6EIuH7ElI0w52ZJ4UJPJJxobhU1+V:PtNKLEIuHyz114
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-52849205209409204980245\winmgr.exe = "C:\\Users\\Admin\\M-52849205209409204980245\\winmgr.exe:*:Enabled:Microsoft Windows Manager" 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe -
Executes dropped EXE 2 IoCs
Processes:
winmgr.exewinmgr.exepid process 220 winmgr.exe 4028 winmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Users\\Admin\\M-52849205209409204980245\\winmgr.exe" 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exewinmgr.exedescription pid process target process PID 4956 set thread context of 100 4956 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe PID 220 set thread context of 4028 220 winmgr.exe winmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exewinmgr.exepid process 4956 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe 220 winmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exewinmgr.exepid process 4956 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe 4956 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe 220 winmgr.exe 220 winmgr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exewinmgr.exedescription pid process target process PID 4956 wrote to memory of 100 4956 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe PID 4956 wrote to memory of 100 4956 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe PID 4956 wrote to memory of 100 4956 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe PID 100 wrote to memory of 220 100 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe winmgr.exe PID 100 wrote to memory of 220 100 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe winmgr.exe PID 100 wrote to memory of 220 100 81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe winmgr.exe PID 220 wrote to memory of 4028 220 winmgr.exe winmgr.exe PID 220 wrote to memory of 4028 220 winmgr.exe winmgr.exe PID 220 wrote to memory of 4028 220 winmgr.exe winmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe"C:\Users\Admin\AppData\Local\Temp\81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe"C:\Users\Admin\AppData\Local\Temp\81e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b.exe"2⤵
- Modifies firewall policy service
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\M-52849205209409204980245\winmgr.exeC:\Users\Admin\M-52849205209409204980245\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\M-52849205209409204980245\winmgr.exeC:\Users\Admin\M-52849205209409204980245\winmgr.exe4⤵
- Executes dropped EXE
PID:4028
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD52bc0356986bda4a28e16a5b8b137cc57
SHA11de52df17c2dd05362e0eccf22ebff49c3b81f58
SHA25681e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b
SHA512235e794cdc7617c0bfb9b17944d1eb27212609067f92851588aa034c8d5f73b13fe0abc9c6952f6b39ef0fe467aa6a48918a432b52fbc42853212d9b7f4092b4
-
Filesize
548KB
MD52bc0356986bda4a28e16a5b8b137cc57
SHA11de52df17c2dd05362e0eccf22ebff49c3b81f58
SHA25681e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b
SHA512235e794cdc7617c0bfb9b17944d1eb27212609067f92851588aa034c8d5f73b13fe0abc9c6952f6b39ef0fe467aa6a48918a432b52fbc42853212d9b7f4092b4
-
Filesize
548KB
MD52bc0356986bda4a28e16a5b8b137cc57
SHA11de52df17c2dd05362e0eccf22ebff49c3b81f58
SHA25681e61437b38804c696ed37e590876bd626220f8f1756e6f29a1648d166ff399b
SHA512235e794cdc7617c0bfb9b17944d1eb27212609067f92851588aa034c8d5f73b13fe0abc9c6952f6b39ef0fe467aa6a48918a432b52fbc42853212d9b7f4092b4