Analysis
-
max time kernel
153s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:54
Static task
static1
Behavioral task
behavioral1
Sample
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe
Resource
win10v2004-20220812-en
General
-
Target
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe
-
Size
383KB
-
MD5
d69dc9da91f16d1debcfa03ae9495cde
-
SHA1
a3239ba85cc5127d8e8a0410bd2d50b6b9b9f055
-
SHA256
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e
-
SHA512
4f3f173b56bae76cdf4ba2e73db0b70f32d578ab5f53aae829885fde1957716e4c2fe489df95db721d3871fcc76940c287c4e800dddab85a6295a7598834fe89
-
SSDEEP
3072:XnjFDLmExpG3/go/VfLOmJXyWLI+0B39/dHcs7q8+gCeXBzlWk3uIaOhbojWTTwk:Xnj1L9xp++/VNFHYl6xz31aOhbxTJ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exenotepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iskjkr = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Iskjkr.exe" notepad.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exenotepad.exedescription ioc process File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exedescription pid process target process PID 536 set thread context of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2060 set thread context of 4788 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exesvchost.exe7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exepid process 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 4880 svchost.exe 4880 svchost.exe 4788 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 4788 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 4788 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exepid process 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exesvchost.execalc.exenotepad.exedescription pid process Token: SeDebugPrivilege 4788 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe Token: SeDebugPrivilege 4880 svchost.exe Token: SeDebugPrivilege 3452 calc.exe Token: SeDebugPrivilege 2860 notepad.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exesvchost.exe7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exedescription pid process target process PID 536 wrote to memory of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 536 wrote to memory of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 536 wrote to memory of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 536 wrote to memory of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 536 wrote to memory of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 536 wrote to memory of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 536 wrote to memory of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 536 wrote to memory of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 536 wrote to memory of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 536 wrote to memory of 2060 536 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2060 wrote to memory of 4880 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 2060 wrote to memory of 4880 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 2060 wrote to memory of 4880 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 2060 wrote to memory of 4880 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 2060 wrote to memory of 3452 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 2060 wrote to memory of 3452 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 2060 wrote to memory of 3452 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 2060 wrote to memory of 3452 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 2060 wrote to memory of 3452 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 4880 wrote to memory of 2860 4880 svchost.exe notepad.exe PID 4880 wrote to memory of 2860 4880 svchost.exe notepad.exe PID 4880 wrote to memory of 2860 4880 svchost.exe notepad.exe PID 4880 wrote to memory of 2860 4880 svchost.exe notepad.exe PID 2060 wrote to memory of 4788 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2060 wrote to memory of 4788 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2060 wrote to memory of 4788 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2060 wrote to memory of 4788 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2060 wrote to memory of 4788 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2060 wrote to memory of 4788 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2060 wrote to memory of 4788 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2060 wrote to memory of 4788 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 2060 wrote to memory of 4788 2060 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe PID 4788 wrote to memory of 4880 4788 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 4788 wrote to memory of 4880 4788 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe svchost.exe PID 4788 wrote to memory of 3452 4788 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 4788 wrote to memory of 3452 4788 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe calc.exe PID 4788 wrote to memory of 2860 4788 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe notepad.exe PID 4788 wrote to memory of 2860 4788 7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"C:\Users\Admin\AppData\Local\Temp\7b57272fbaa276cbb021b7ce286b15d5af2d3b224c7a06aa358a49f77eff808e.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4788