Analysis
-
max time kernel
179s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:40
Static task
static1
Behavioral task
behavioral1
Sample
4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exe
Resource
win10v2004-20221111-en
General
-
Target
4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exe
-
Size
114KB
-
MD5
09224b825f56cbeddc1f885f4e322a40
-
SHA1
2ba82c2fee8722cac65978aca2712245b192500e
-
SHA256
4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20
-
SHA512
b68589afe4a557d09aea74dbd6a3d6796ab5e1961b8f10d43375e4340cc96f2e08438785d38891ba39becd48f2196ce5c8b3cb343b1083704fa3f017c952940e
-
SSDEEP
3072:B+3rnRRy6Z296cjNZGIwpYYdftMdzsFGY9fY:orRRyD5E8YZOCQYO
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vturukrl = "\"C:\\Users\\Admin\\AppData\\Local\\nqoxbarj.exe\"" svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exepid process 1008 4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exe 1008 4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exedescription pid process target process PID 1008 wrote to memory of 2072 1008 4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exe svchost.exe PID 1008 wrote to memory of 2072 1008 4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exe svchost.exe PID 1008 wrote to memory of 2072 1008 4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exe"C:\Users\Admin\AppData\Local\Temp\4a32a8db10f45e2dff4550311ff4d09da7e5a638b9ce6f27d29d6fe204e51d20.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Adds Run key to start application
PID:2072
-