Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:54
Static task
static1
Behavioral task
behavioral1
Sample
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe
Resource
win10v2004-20220812-en
General
-
Target
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe
-
Size
383KB
-
MD5
d69dc9da91f16d1debcfa03ae9495cde
-
SHA1
a3239ba85cc5127d8e8a0410bd2d50b6b9b9f055
-
SHA256
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e
-
SHA512
4f3f173b56bae76cdf4ba2e73db0b70f32d578ab5f53aae829885fde1957716e4c2fe489df95db721d3871fcc76940c287c4e800dddab85a6295a7598834fe89
-
SSDEEP
3072:XnjFDLmExpG3/go/VfLOmJXyWLI+0B39/dHcs7q8+gCeXBzlWk3uIaOhbojWTTwk:Xnj1L9xp++/VNFHYl6xz31aOhbxTJ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exenotepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rgirii = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Rgirii.exe" notepad.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exenotepad.exedescription ioc process File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\Z: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exedescription pid process target process PID 2032 set thread context of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 set thread context of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exesvchost.exe7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exepid process 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 1336 svchost.exe 1808 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exepid process 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exesvchost.execalc.exenotepad.exedescription pid process Token: SeDebugPrivilege 1808 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe Token: SeDebugPrivilege 1336 svchost.exe Token: SeDebugPrivilege 1680 calc.exe Token: SeDebugPrivilege 1120 notepad.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exesvchost.exe7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exedescription pid process target process PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2032 wrote to memory of 1712 2032 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 wrote to memory of 1336 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 1712 wrote to memory of 1336 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 1712 wrote to memory of 1336 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 1712 wrote to memory of 1336 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 1712 wrote to memory of 1680 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 1712 wrote to memory of 1680 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 1712 wrote to memory of 1680 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 1712 wrote to memory of 1680 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 1712 wrote to memory of 1680 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 1712 wrote to memory of 1680 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 1712 wrote to memory of 1336 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 1336 wrote to memory of 1120 1336 svchost.exe notepad.exe PID 1336 wrote to memory of 1120 1336 svchost.exe notepad.exe PID 1336 wrote to memory of 1120 1336 svchost.exe notepad.exe PID 1336 wrote to memory of 1120 1336 svchost.exe notepad.exe PID 1336 wrote to memory of 1120 1336 svchost.exe notepad.exe PID 1712 wrote to memory of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 wrote to memory of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 wrote to memory of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 wrote to memory of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 wrote to memory of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 wrote to memory of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 wrote to memory of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 wrote to memory of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 wrote to memory of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1712 wrote to memory of 1808 1712 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 1808 wrote to memory of 1336 1808 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 1808 wrote to memory of 1336 1808 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 1808 wrote to memory of 1680 1808 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 1808 wrote to memory of 1680 1808 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 1808 wrote to memory of 1120 1808 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe notepad.exe PID 1808 wrote to memory of 1120 1808 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1120 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808