Analysis
-
max time kernel
150s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:42
Static task
static1
Behavioral task
behavioral1
Sample
2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe
Resource
win10v2004-20220812-en
General
-
Target
2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe
-
Size
146KB
-
MD5
95cef99dd8ed824a90e544deb4f0d56d
-
SHA1
ce4ca4243380ce94c0614d250cc8f950213636ed
-
SHA256
2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a
-
SHA512
ecc485415b08a8d68ef63975ad08d4176c4e1c0f56ecc707898d9c9cd753b14c7e5524841ee4b28b017449c301a09ae58ccecc9c5717b86f4bbd508c417e7a10
-
SSDEEP
3072:dQq0CgpyfPF9Dc/fFs+UaP+DFq14Es4V:NBkyPH/+r001VV
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
explorer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a134133.exe explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a13413 = "C:\\a134133\\a134133.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*13413 = "C:\\a134133\\a134133.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a134133 = "C:\\Users\\Admin\\AppData\\Roaming\\a134133.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*134133 = "C:\\Users\\Admin\\AppData\\Roaming\\a134133.exe" explorer.exe -
Drops file in Windows directory 1 IoCs
Processes:
2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exedescription ioc process File opened for modification C:\Windows\2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.INI 2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exeexplorer.exepid process 3880 2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe 4716 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exepid process 3880 2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe 3880 2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exeexplorer.exedescription pid process target process PID 3880 wrote to memory of 4716 3880 2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe explorer.exe PID 3880 wrote to memory of 4716 3880 2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe explorer.exe PID 3880 wrote to memory of 4716 3880 2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe explorer.exe PID 4716 wrote to memory of 4268 4716 explorer.exe svchost.exe PID 4716 wrote to memory of 4268 4716 explorer.exe svchost.exe PID 4716 wrote to memory of 4268 4716 explorer.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe"C:\Users\Admin\AppData\Local\Temp\2b8ec9ff2b29b4cbafa78ef2f4942bd3cb57d85a0482160c45a5b42dd7a21b0a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\svchost.exe-k netsvcs3⤵PID:4268