Analysis
-
max time kernel
151s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:41
Static task
static1
Behavioral task
behavioral1
Sample
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe
Resource
win10v2004-20220812-en
General
-
Target
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe
-
Size
85KB
-
MD5
3f731af7ec3d833439cc2dd9497b72ca
-
SHA1
5f6fd48d5096461a0b6d9e13a62bc8f0b7d39547
-
SHA256
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb
-
SHA512
2bc351bc9808d5fb094eb3a5c54318c935815bc8367c921f0b384052007141db40004e4b43995c4971a21cda1de0c17dcb5dfddd8a66871ac1e0b354d514626d
-
SSDEEP
1536:VGLyzqIfhbp1pG7eWLX1v8W84gYWmdmsnHm7ayzSY+4JdLzFDhRnP5F:VJWTGttmLHm7DSYfBzFDhRnD
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4708-133-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4708-136-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4708-137-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4708-138-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4708-139-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "c:\\users\\admin\\appdata\\local\\temp\\2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe" 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exedescription pid process target process PID 2184 set thread context of 4708 2184 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exepid process 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exepid process 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 4708 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exedescription pid process target process PID 2184 wrote to memory of 4708 2184 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 2184 wrote to memory of 4708 2184 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 2184 wrote to memory of 4708 2184 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 2184 wrote to memory of 4708 2184 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 2184 wrote to memory of 4708 2184 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 2184 wrote to memory of 4708 2184 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 2184 wrote to memory of 4708 2184 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 2184 wrote to memory of 4708 2184 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe"C:\Users\Admin\AppData\Local\Temp\2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\users\admin\appdata\local\temp\2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe"c:\users\admin\appdata\local\temp\2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4708