Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:07
Static task
static1
Behavioral task
behavioral1
Sample
5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe
Resource
win10v2004-20221111-en
General
-
Target
5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe
-
Size
440KB
-
MD5
173085a6a9ae2a9ed4cc35b5eb462a72
-
SHA1
bea1fbb07d9e014a69b0e6c243550d8b709ac55c
-
SHA256
5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e
-
SHA512
c3592d71709f81fe2ded7be2579089357a979f5487abf2c4169f0505b44adf5172482d7dbccad99abfa74cf1dac1982e022ac9052a8221555cc9f1d51228e36d
-
SSDEEP
6144:3Cof/2jF8rNFFO14qiFVsNewYDtw6hLa4s1kdv04c0L7uZQike7EB:Hhrto2wY9MXSv0PDQy
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run 5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe" 5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe -
Drops file in Windows directory 1 IoCs
Processes:
5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exedescription ioc process File opened for modification C:\Windows\5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.INI 5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exepid process 1632 5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe 1632 5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1276 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exepid process 1632 5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeDebugPrivilege 1276 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1276 1276 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1276 1276 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exepid process 1632 5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe 1632 5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exepid process 1632 5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe"C:\Users\Admin\AppData\Local\Temp\5b95678162c8d31279820d1732b079420db4124ecedff792eb007b91a698d43e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:1632