Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:08
Static task
static1
Behavioral task
behavioral1
Sample
63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe
Resource
win10v2004-20221111-en
General
-
Target
63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe
-
Size
138KB
-
MD5
a7a92416b1fac1199b3e9b7290bb8b71
-
SHA1
3c03b4f626d82908d281b2615c7728ff7536dd57
-
SHA256
63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca
-
SHA512
1253db9c29379fd969dcaf8560cb9c92eb443d9669c036cfce992082613088edeadae2da48d4139497aa5f30acb659093eaab997b8ce08b3f94e110fef53a36b
-
SSDEEP
3072:TazlT6yKHV3NBsn5mOqHd7rKV67t0GOpko6D1z47Q2:Ul613NBkS7OV/ppkoEBQl
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exenotepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sgkwko = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Sgkwko.exe" notepad.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exenotepad.exedescription ioc process File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\P: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exedescription pid process target process PID 1960 set thread context of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 set thread context of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exesvchost.exe63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exepid process 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 1240 svchost.exe 2028 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exepid process 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exesvchost.exenotepad.exedescription pid process Token: 33 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe Token: SeIncBasePriorityPrivilege 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe Token: SeDebugPrivilege 2028 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe Token: SeDebugPrivilege 1240 svchost.exe Token: SeDebugPrivilege 1224 notepad.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exesvchost.exe63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exedescription pid process target process PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1960 wrote to memory of 1488 1960 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 wrote to memory of 1240 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe svchost.exe PID 1488 wrote to memory of 1240 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe svchost.exe PID 1488 wrote to memory of 1240 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe svchost.exe PID 1488 wrote to memory of 1240 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe svchost.exe PID 1488 wrote to memory of 1240 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe svchost.exe PID 1240 wrote to memory of 1224 1240 svchost.exe notepad.exe PID 1240 wrote to memory of 1224 1240 svchost.exe notepad.exe PID 1240 wrote to memory of 1224 1240 svchost.exe notepad.exe PID 1240 wrote to memory of 1224 1240 svchost.exe notepad.exe PID 1240 wrote to memory of 1224 1240 svchost.exe notepad.exe PID 1488 wrote to memory of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 wrote to memory of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 wrote to memory of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 wrote to memory of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 wrote to memory of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 wrote to memory of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 wrote to memory of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 wrote to memory of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 wrote to memory of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 1488 wrote to memory of 2028 1488 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe PID 2028 wrote to memory of 1240 2028 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe svchost.exe PID 2028 wrote to memory of 1240 2028 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe svchost.exe PID 2028 wrote to memory of 1360 2028 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe calc.exe PID 2028 wrote to memory of 1360 2028 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe calc.exe PID 2028 wrote to memory of 1224 2028 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe notepad.exe PID 2028 wrote to memory of 1224 2028 63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe"C:\Users\Admin\AppData\Local\Temp\63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe"C:\Users\Admin\AppData\Local\Temp\63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe"C:\Users\Admin\AppData\Local\Temp\63b7814f93b5d76e50a37ff45f719beca436ce0980858fda7492561247a721ca.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028
-
-