Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 23:55
Static task
static1
Behavioral task
behavioral1
Sample
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe
Resource
win10v2004-20220812-en
General
-
Target
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe
-
Size
263KB
-
MD5
8719d74154a1f76b0d2ed6646a2685e8
-
SHA1
0a03e8a0a13668f5ccc337811d32b7c6ba3e64ed
-
SHA256
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392
-
SHA512
625e39b5ddcc8bee2ced26f35f5f5665f79969faa7bfe3b93060e401903ee2a89526d5c39583ec89b38ea705781123ac8e1a4f0599731f726aff4421ea460ee6
-
SSDEEP
6144:f/bILVvWfZc2yZXmCX9JPVtyjXP56OS+Is:f0xWfZc2C2C3NtyjDPj
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-5078860807246347675945\winmgr.exe = "C:\\Users\\Admin\\M-5078860807246347675945\\winmgr.exe:*:Enabled:Microsoft Windows Manager" 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe -
Executes dropped EXE 2 IoCs
Processes:
winmgr.exewinmgr.exepid process 1620 winmgr.exe 2672 winmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Users\\Admin\\M-5078860807246347675945\\winmgr.exe" 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exewinmgr.exepid process 5044 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 1620 winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exewinmgr.exedescription pid process target process PID 5044 set thread context of 2620 5044 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe PID 1620 set thread context of 2672 1620 winmgr.exe winmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exewinmgr.exepid process 5044 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 1620 winmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exewinmgr.exepid process 5044 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 5044 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 1620 winmgr.exe 1620 winmgr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exewinmgr.exedescription pid process target process PID 5044 wrote to memory of 2620 5044 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe PID 5044 wrote to memory of 2620 5044 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe PID 5044 wrote to memory of 2620 5044 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe PID 2620 wrote to memory of 1620 2620 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe winmgr.exe PID 2620 wrote to memory of 1620 2620 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe winmgr.exe PID 2620 wrote to memory of 1620 2620 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe winmgr.exe PID 1620 wrote to memory of 2672 1620 winmgr.exe winmgr.exe PID 1620 wrote to memory of 2672 1620 winmgr.exe winmgr.exe PID 1620 wrote to memory of 2672 1620 winmgr.exe winmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe"C:\Users\Admin\AppData\Local\Temp\711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe"C:\Users\Admin\AppData\Local\Temp\711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe"2⤵
- Modifies firewall policy service
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\M-5078860807246347675945\winmgr.exeC:\Users\Admin\M-5078860807246347675945\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\M-5078860807246347675945\winmgr.exeC:\Users\Admin\M-5078860807246347675945\winmgr.exe4⤵
- Executes dropped EXE
PID:2672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD58719d74154a1f76b0d2ed6646a2685e8
SHA10a03e8a0a13668f5ccc337811d32b7c6ba3e64ed
SHA256711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392
SHA512625e39b5ddcc8bee2ced26f35f5f5665f79969faa7bfe3b93060e401903ee2a89526d5c39583ec89b38ea705781123ac8e1a4f0599731f726aff4421ea460ee6
-
Filesize
263KB
MD58719d74154a1f76b0d2ed6646a2685e8
SHA10a03e8a0a13668f5ccc337811d32b7c6ba3e64ed
SHA256711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392
SHA512625e39b5ddcc8bee2ced26f35f5f5665f79969faa7bfe3b93060e401903ee2a89526d5c39583ec89b38ea705781123ac8e1a4f0599731f726aff4421ea460ee6
-
Filesize
263KB
MD58719d74154a1f76b0d2ed6646a2685e8
SHA10a03e8a0a13668f5ccc337811d32b7c6ba3e64ed
SHA256711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392
SHA512625e39b5ddcc8bee2ced26f35f5f5665f79969faa7bfe3b93060e401903ee2a89526d5c39583ec89b38ea705781123ac8e1a4f0599731f726aff4421ea460ee6