Analysis
-
max time kernel
148s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:34
Static task
static1
Behavioral task
behavioral1
Sample
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe
Resource
win10v2004-20220812-en
General
-
Target
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe
-
Size
183KB
-
MD5
cae5375edf4df5c7e703de7466194367
-
SHA1
a6f60837bf37c64800d7333695cc63b9aad2a967
-
SHA256
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207
-
SHA512
7d083bb26c378a58aca53ae14da5a966b459c0ea7e16fcece3de5f14c68edf95132d7cc754eda550dbf074dbc5209af5616b1e7aeff640be62d09d4c01ff4745
-
SSDEEP
3072:KBPUQsZZQvSq8QM6L8QZ6UV8Q+UZOi9CDDwTgVEZM1n87fhzGlu4I:wxsZL7QM6L8QZ668cZOi4wi9afw
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{2044bf79-846b-6002-d22d-675c414e0021}\\n." 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe -
Unexpected DNS network traffic destination 8 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 91.193.74.13 Destination IP 66.85.130.234 Destination IP 91.193.74.13 Destination IP 66.85.130.234 Destination IP 91.193.74.13 Destination IP 91.193.74.13 Destination IP 66.85.130.234 Destination IP 66.85.130.234 -
Modifies registry class 5 IoCs
Processes:
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{2044bf79-846b-6002-d22d-675c414e0021}\\n." 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\clsid 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1} 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exepid process 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2644 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exedescription pid process Token: SeDebugPrivilege 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe Token: SeDebugPrivilege 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe Token: SeDebugPrivilege 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exedescription pid process target process PID 2440 wrote to memory of 2644 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe Explorer.EXE PID 2440 wrote to memory of 2644 2440 394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe"C:\Users\Admin\AppData\Local\Temp\394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe"2⤵
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440