Analysis
-
max time kernel
207s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 21:39
Static task
static1
Behavioral task
behavioral1
Sample
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe
Resource
win10v2004-20221111-en
General
-
Target
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe
-
Size
262KB
-
MD5
dd3d297db386103f447b5eed0e62b408
-
SHA1
5685ac2294da0581d3e33037b151709d61a98f4b
-
SHA256
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43
-
SHA512
3feb95985416ca6918e1d7d30bfe848e2019847cbf1ad3db4b194c229747a076945b81c605e368dac10451e0176603320f7d8d835d47fbbc3bc37e4118e4ceaf
-
SSDEEP
6144:A/bILVvWfZc2yUyfi8j4VtyjXP56OS+I1:A0xWfZc2PJZtyjDPa
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-5078860807246347675945\winmgr.exe = "C:\\Users\\Admin\\M-5078860807246347675945\\winmgr.exe:*:Enabled:Microsoft Windows Manager" 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe -
Executes dropped EXE 2 IoCs
Processes:
winmgr.exewinmgr.exepid process 3512 winmgr.exe 1776 winmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Users\\Admin\\M-5078860807246347675945\\winmgr.exe" 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exewinmgr.exepid process 2396 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 3512 winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exewinmgr.exedescription pid process target process PID 2396 set thread context of 4732 2396 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe PID 3512 set thread context of 1776 3512 winmgr.exe winmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exewinmgr.exepid process 2396 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 3512 winmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exewinmgr.exepid process 2396 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 2396 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 3512 winmgr.exe 3512 winmgr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exewinmgr.exedescription pid process target process PID 2396 wrote to memory of 4732 2396 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe PID 2396 wrote to memory of 4732 2396 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe PID 2396 wrote to memory of 4732 2396 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe PID 4732 wrote to memory of 3512 4732 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe winmgr.exe PID 4732 wrote to memory of 3512 4732 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe winmgr.exe PID 4732 wrote to memory of 3512 4732 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe winmgr.exe PID 3512 wrote to memory of 1776 3512 winmgr.exe winmgr.exe PID 3512 wrote to memory of 1776 3512 winmgr.exe winmgr.exe PID 3512 wrote to memory of 1776 3512 winmgr.exe winmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe"C:\Users\Admin\AppData\Local\Temp\9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe"C:\Users\Admin\AppData\Local\Temp\9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe"2⤵
- Modifies firewall policy service
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\M-5078860807246347675945\winmgr.exeC:\Users\Admin\M-5078860807246347675945\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\M-5078860807246347675945\winmgr.exeC:\Users\Admin\M-5078860807246347675945\winmgr.exe4⤵
- Executes dropped EXE
PID:1776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5dd3d297db386103f447b5eed0e62b408
SHA15685ac2294da0581d3e33037b151709d61a98f4b
SHA2569d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43
SHA5123feb95985416ca6918e1d7d30bfe848e2019847cbf1ad3db4b194c229747a076945b81c605e368dac10451e0176603320f7d8d835d47fbbc3bc37e4118e4ceaf
-
Filesize
262KB
MD5dd3d297db386103f447b5eed0e62b408
SHA15685ac2294da0581d3e33037b151709d61a98f4b
SHA2569d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43
SHA5123feb95985416ca6918e1d7d30bfe848e2019847cbf1ad3db4b194c229747a076945b81c605e368dac10451e0176603320f7d8d835d47fbbc3bc37e4118e4ceaf
-
Filesize
262KB
MD5dd3d297db386103f447b5eed0e62b408
SHA15685ac2294da0581d3e33037b151709d61a98f4b
SHA2569d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43
SHA5123feb95985416ca6918e1d7d30bfe848e2019847cbf1ad3db4b194c229747a076945b81c605e368dac10451e0176603320f7d8d835d47fbbc3bc37e4118e4ceaf