Resubmissions
25-11-2022 11:39
221125-nslmxseb32 8Analysis
-
max time kernel
102s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 11:39
Behavioral task
behavioral1
Sample
eOWDJmB3Qt.exe
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
eOWDJmB3Qt.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
eOWDJmB3Qt.exe
-
Size
3.4MB
-
MD5
a198d2e7ddac7c3d381da9b2e5446142
-
SHA1
61aff012de5ac9eb5247f182320b1df434a22c93
-
SHA256
f432910b309b296e4cf2e662092657060f0e24222ccf1239a67c69b9db8daf68
-
SHA512
6e661c2c46ea0f57dc0dafe0e01bc32258d740d9938bec27b7558ae020ff51cdfd41351df52b06da86f25dc59c318fa37660b7da51ad34dd69b0f8bcbcb6b44a
-
SSDEEP
98304:ZBvIB2CVEqzsJGwUv6Fvx6KW2wBBJIdnjjgI8D:ZekJGwUi1WMjjW
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
eOWDJmB3Qt.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\KgMcaYtBcEwhpo\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\vqJADiYishyqoTEumFQMOIx" eOWDJmB3Qt.exe -
Processes:
resource yara_rule behavioral1/memory/1784-55-0x0000000000400000-0x0000000000B45000-memory.dmp vmprotect behavioral1/memory/1784-58-0x0000000000400000-0x0000000000B45000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
eOWDJmB3Qt.exepid process 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
eOWDJmB3Qt.exepid process 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe 1784 eOWDJmB3Qt.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
eOWDJmB3Qt.exepid process 1784 eOWDJmB3Qt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
eOWDJmB3Qt.exedescription pid process Token: SeDebugPrivilege 1784 eOWDJmB3Qt.exe Token: SeLoadDriverPrivilege 1784 eOWDJmB3Qt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eOWDJmB3Qt.exe"C:\Users\Admin\AppData\Local\Temp\eOWDJmB3Qt.exe"1⤵
- Sets service image path in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken