Analysis
-
max time kernel
46s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe
Resource
win10v2004-20221111-en
General
-
Target
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe
-
Size
194KB
-
MD5
9c8cd9cf5a547edf7a2f3ae2505917ca
-
SHA1
12b19be467e056bdbfdc0e8a014656b7f2977932
-
SHA256
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620
-
SHA512
17c0f36b0ef3bc2fd50656f498dd576da26df92f6940458304bb48ec9ed5b85ac34132977e040c32553247cb63e495dcd3343fd1017ec959544775de3c957b6d
-
SSDEEP
3072:HNaP3zllRFUTp7YLhc/fNxyKn4MyvHlxFILjT:YP3JlRFUFUhcHZGHlU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\RECYCLER\\S-1-5-21-0243556031-888888379-781862338-92181681\\1887g3dq8.exe" de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\6p28g7dq8 = "C:\\RECYCLER\\S-1-5-21-0243556031-888888379-781862338-92181681\\1887g3dq8.exe" de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exedescription ioc process File created C:\RECYCLER\S-1-5-21-0243556031-888888379-781862338-92181681\Desktop.ini de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe -
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Taskman = "C:\\RECYCLER\\S-1-5-21-0243556031-888888379-781862338-92181681\\1887g3dq8.exe" de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exedescription pid process target process PID 932 set thread context of 892 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exede7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exepid process 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe 892 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exede7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exedescription pid process target process PID 932 wrote to memory of 892 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe PID 932 wrote to memory of 892 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe PID 932 wrote to memory of 892 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe PID 932 wrote to memory of 892 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe PID 932 wrote to memory of 892 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe PID 932 wrote to memory of 892 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe PID 932 wrote to memory of 892 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe PID 932 wrote to memory of 892 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe PID 932 wrote to memory of 892 932 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe PID 892 wrote to memory of 1208 892 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe Explorer.EXE PID 892 wrote to memory of 1208 892 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe Explorer.EXE PID 892 wrote to memory of 1208 892 de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe"C:\Users\Admin\AppData\Local\Temp\de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe"C:\Users\Admin\AppData\Local\Temp\de7a44771168e6be8c5c3bc90b3755eb5a5f4e059a65b648a3b85a671bf43620.exe"3⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops desktop.ini file(s)
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:892
-
-