Analysis
-
max time kernel
39s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe
Resource
win10v2004-20221111-en
General
-
Target
082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe
-
Size
32KB
-
MD5
16c10debd768e5f046b08a8efeee0383
-
SHA1
3c10690edb20082ecab50be3d0f183ee164d8651
-
SHA256
082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53
-
SHA512
8e5da42fbacb8cf8793d8e6fdcaee862b1263936364ccdedf57cae3ce8ff67b2c97debc836af815496e63fcfa3a20173b0c22c03a645f07a852c11967db180c2
-
SSDEEP
768:ZdqObvePVaak4/8xgknUxGIAG1F5+jnpxlIy2AGJ:Z0OKPVnv/8xguUxfAGQU
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1776 set thread context of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 2040 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 2040 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28 PID 1776 wrote to memory of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28 PID 1776 wrote to memory of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28 PID 1776 wrote to memory of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28 PID 1776 wrote to memory of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28 PID 1776 wrote to memory of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28 PID 1776 wrote to memory of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28 PID 1776 wrote to memory of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28 PID 1776 wrote to memory of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28 PID 1776 wrote to memory of 2040 1776 082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe"C:\Users\Admin\AppData\Local\Temp\082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\082c4926b6c00ab6c69f5121bd12935dc6cd0e9ccbdc11264cfc574bc9246d53.exea|2⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:2040
-