Analysis
-
max time kernel
152s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:26
Static task
static1
Behavioral task
behavioral1
Sample
46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe
Resource
win10v2004-20220812-en
General
-
Target
46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe
-
Size
158KB
-
MD5
34926506fefc6f5ebace4672d93af6ba
-
SHA1
4afaa8fe82b71906acf06cb2d7e52de160df2e85
-
SHA256
46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29
-
SHA512
cd600ea51963756703a7c438c0d8c2d4adc06d5dd5d4521baea6335f8e8c5ca9c1b6f66d6c7ae0d24d7d9c841588944fadf23375555368422f50adf6527baac5
-
SSDEEP
3072:FZefcXfiFuibp8/6im+9eJAtp2Ll7JvAGk2ck:FZeEXfiLpAmAtpWMzk
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
svchost.exe46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 516 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9Y2FDk3HfnK8.bmp\U000c106c\uf2ba犜\ue9d0M" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exedescription pid process target process PID 828 set thread context of 1960 828 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe svchost.exe -
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exesvchost.exepid process 828 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe 1960 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exepid process 828 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
svchost.exepid process 1960 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
svchost.exepid process 1960 svchost.exe 1960 svchost.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exepid process 828 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exesvchost.exedescription pid process target process PID 828 wrote to memory of 1960 828 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe svchost.exe PID 828 wrote to memory of 1960 828 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe svchost.exe PID 828 wrote to memory of 1960 828 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe svchost.exe PID 828 wrote to memory of 1960 828 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe svchost.exe PID 828 wrote to memory of 1960 828 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe svchost.exe PID 828 wrote to memory of 1960 828 46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe svchost.exe PID 1960 wrote to memory of 516 1960 svchost.exe cmd.exe PID 1960 wrote to memory of 516 1960 svchost.exe cmd.exe PID 1960 wrote to memory of 516 1960 svchost.exe cmd.exe PID 1960 wrote to memory of 516 1960 svchost.exe cmd.exe PID 1960 wrote to memory of 1000 1960 svchost.exe ctfmon.exe PID 1960 wrote to memory of 1000 1960 svchost.exe ctfmon.exe PID 1960 wrote to memory of 1000 1960 svchost.exe ctfmon.exe PID 1960 wrote to memory of 1000 1960 svchost.exe ctfmon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe"C:\Users\Admin\AppData\Local\Temp\46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c for /l %i in (1, 1, 4000000000) do if not exist "C:\Users\Admin\AppData\Local\Temp\46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe" (exit) else (del /f "C:\Users\Admin\AppData\Local\Temp\46d55c0f9b4a86890ce08b736be10a8e79bccd552b7e8c3ba8ea7da17dccfb29.exe")3⤵
- Deletes itself
PID:516 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe3⤵PID:1000