Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:37
Static task
static1
Behavioral task
behavioral1
Sample
33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe
Resource
win10v2004-20220812-en
General
-
Target
33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe
-
Size
202KB
-
MD5
9607d238fdefe44f890bf61b744f4b5c
-
SHA1
eacff2409e64f12e87ae3a338732c0439c15e9b6
-
SHA256
33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498
-
SHA512
0cd043e6da5fa3a27a8095211bf6a2ec021c3b140ec0a257243b7e110b2d6ef9c72b1eaab1902dce9aec740a0397ecc7b230e5f1dfaf1f611c168c8a715d4a0c
-
SSDEEP
3072:tUKWZa5ITmeyPCMdH2AY0M9KnglCnX4+TKqwZ68wLssdJToc:2bM5UmJddSKnglQo+Ti68Gssdd
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exenotepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iozjzr = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Iozjzr.exe" notepad.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exenotepad.exedescription ioc process File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\J: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exedescription pid process target process PID 880 set thread context of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 1044 set thread context of 4592 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exesvchost.exe33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exepid process 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 3324 svchost.exe 3324 svchost.exe 4592 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 4592 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 4592 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exepid process 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exesvchost.execalc.exenotepad.exedescription pid process Token: SeDebugPrivilege 4592 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe Token: SeDebugPrivilege 3324 svchost.exe Token: SeDebugPrivilege 4292 calc.exe Token: SeDebugPrivilege 4928 notepad.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exesvchost.exe33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exedescription pid process target process PID 880 wrote to memory of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 880 wrote to memory of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 880 wrote to memory of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 880 wrote to memory of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 880 wrote to memory of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 880 wrote to memory of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 880 wrote to memory of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 880 wrote to memory of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 880 wrote to memory of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 880 wrote to memory of 1044 880 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 1044 wrote to memory of 3324 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe svchost.exe PID 1044 wrote to memory of 3324 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe svchost.exe PID 1044 wrote to memory of 3324 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe svchost.exe PID 1044 wrote to memory of 3324 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe svchost.exe PID 1044 wrote to memory of 4292 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe calc.exe PID 1044 wrote to memory of 4292 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe calc.exe PID 1044 wrote to memory of 4292 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe calc.exe PID 1044 wrote to memory of 4292 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe calc.exe PID 1044 wrote to memory of 4292 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe calc.exe PID 3324 wrote to memory of 4928 3324 svchost.exe notepad.exe PID 3324 wrote to memory of 4928 3324 svchost.exe notepad.exe PID 3324 wrote to memory of 4928 3324 svchost.exe notepad.exe PID 3324 wrote to memory of 4928 3324 svchost.exe notepad.exe PID 1044 wrote to memory of 4592 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 1044 wrote to memory of 4592 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 1044 wrote to memory of 4592 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 1044 wrote to memory of 4592 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 1044 wrote to memory of 4592 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 1044 wrote to memory of 4592 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 1044 wrote to memory of 4592 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 1044 wrote to memory of 4592 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 1044 wrote to memory of 4592 1044 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe PID 4592 wrote to memory of 3324 4592 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe svchost.exe PID 4592 wrote to memory of 3324 4592 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe svchost.exe PID 4592 wrote to memory of 4292 4592 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe calc.exe PID 4592 wrote to memory of 4292 4592 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe calc.exe PID 4592 wrote to memory of 4928 4592 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe notepad.exe PID 4592 wrote to memory of 4928 4592 33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe"C:\Users\Admin\AppData\Local\Temp\33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe"C:\Users\Admin\AppData\Local\Temp\33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe"C:\Users\Admin\AppData\Local\Temp\33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4592