Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 23:16
Static task
static1
Behavioral task
behavioral1
Sample
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe
Resource
win10v2004-20220812-en
General
-
Target
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe
-
Size
336KB
-
MD5
ec4d618512c10e518cbbcc425e54e612
-
SHA1
a841f69420290e7f1b4813f4cd141e9a59a73a53
-
SHA256
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926
-
SHA512
526a529445e18e8b9c3d8a55c49c88867249a127a2ebaf75af543f4aaa9ede23888b89bc89adbc5c7160208c66c9bec0b8922f181a750c2691e59e88d9db8f92
-
SSDEEP
6144:pp5aU24gcouSCLo/4A9497IkCxxFrFDRymDLOWve1cCAuT/:ppt24gc+CZA94NIJFxDhLve1Am
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{97AFBD4E-67F9-4158-9645-026EEBABD842}\\f5ea51da.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{97AFBD4E-67F9-4158-9645-026EEBABD842}\\f5ea51da.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exedescription pid process target process PID 1972 set thread context of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
explorer.exepid process 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe -
Suspicious behavior: MapViewOfSection 26 IoCs
Processes:
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exeexplorer.exepid process 1904 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe 1904 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeDebugPrivilege 1628 explorer.exe Token: SeAssignPrimaryTokenPrivilege 872 Token: SeIncreaseQuotaPrivilege 872 Token: SeSecurityPrivilege 872 Token: SeTakeOwnershipPrivilege 872 Token: SeLoadDriverPrivilege 872 Token: SeRestorePrivilege 872 Token: SeSystemEnvironmentPrivilege 872 Token: SeAssignPrimaryTokenPrivilege 872 Token: SeIncreaseQuotaPrivilege 872 Token: SeSecurityPrivilege 872 Token: SeTakeOwnershipPrivilege 872 Token: SeLoadDriverPrivilege 872 Token: SeSystemtimePrivilege 872 Token: SeBackupPrivilege 872 Token: SeRestorePrivilege 872 Token: SeShutdownPrivilege 872 Token: SeSystemEnvironmentPrivilege 872 Token: SeUndockPrivilege 872 Token: SeManageVolumePrivilege 872 Token: SeAssignPrimaryTokenPrivilege 872 Token: SeIncreaseQuotaPrivilege 872 Token: SeSecurityPrivilege 872 Token: SeTakeOwnershipPrivilege 872 Token: SeLoadDriverPrivilege 872 Token: SeRestorePrivilege 872 Token: SeSystemEnvironmentPrivilege 872 Token: SeAssignPrimaryTokenPrivilege 872 Token: SeIncreaseQuotaPrivilege 872 Token: SeSecurityPrivilege 872 Token: SeTakeOwnershipPrivilege 872 Token: SeLoadDriverPrivilege 872 Token: SeRestorePrivilege 872 Token: SeSystemEnvironmentPrivilege 872 Token: SeAssignPrimaryTokenPrivilege 872 Token: SeIncreaseQuotaPrivilege 872 Token: SeSecurityPrivilege 872 Token: SeTakeOwnershipPrivilege 872 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1224 1224 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1224 1224 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exepid process 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe -
Suspicious use of UnmapMainImage 6 IoCs
Processes:
pid process 792 792 792 792 792 792 -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exea0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exedescription pid process target process PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1972 wrote to memory of 1904 1972 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 1904 wrote to memory of 1628 1904 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe explorer.exe PID 1904 wrote to memory of 1628 1904 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe explorer.exe PID 1904 wrote to memory of 1628 1904 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe explorer.exe PID 1904 wrote to memory of 1628 1904 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe explorer.exe PID 384 wrote to memory of 1628 384 explorer.exe PID 384 wrote to memory of 1628 384 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe"C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe"C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-