Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 23:16
Static task
static1
Behavioral task
behavioral1
Sample
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe
Resource
win10v2004-20220812-en
General
-
Target
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe
-
Size
336KB
-
MD5
ec4d618512c10e518cbbcc425e54e612
-
SHA1
a841f69420290e7f1b4813f4cd141e9a59a73a53
-
SHA256
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926
-
SHA512
526a529445e18e8b9c3d8a55c49c88867249a127a2ebaf75af543f4aaa9ede23888b89bc89adbc5c7160208c66c9bec0b8922f181a750c2691e59e88d9db8f92
-
SSDEEP
6144:pp5aU24gcouSCLo/4A9497IkCxxFrFDRymDLOWve1cCAuT/:ppt24gc+CZA94NIJFxDhLve1Am
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6815cdb9 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{A7E888C1-50F0-45A4-A780-AD714D0EA82C}\\6815cdb9.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6815cdb9 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{A7E888C1-50F0-45A4-A780-AD714D0EA82C}\\6815cdb9.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exedescription pid process target process PID 4520 set thread context of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
explorer.exepid process 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe 4280 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exepid process 4656 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe 4656 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe Token: SeDebugPrivilege 4280 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exepid process 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exea0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exedescription pid process target process PID 4520 wrote to memory of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 4520 wrote to memory of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 4520 wrote to memory of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 4520 wrote to memory of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 4520 wrote to memory of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 4520 wrote to memory of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 4520 wrote to memory of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 4520 wrote to memory of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 4520 wrote to memory of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 4520 wrote to memory of 4656 4520 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe PID 4656 wrote to memory of 4280 4656 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe explorer.exe PID 4656 wrote to memory of 4280 4656 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe explorer.exe PID 4656 wrote to memory of 4280 4656 a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe"C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe"C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-