Analysis
-
max time kernel
96s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 12:36
Static task
static1
Behavioral task
behavioral1
Sample
619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe
Resource
win10v2004-20220812-en
General
-
Target
619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe
-
Size
935KB
-
MD5
861395153f47abeecf0b3d4d7b5012c8
-
SHA1
0f7cbbd4314565c1ca9442f572abb5d2383d679a
-
SHA256
619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515
-
SHA512
42726032d7ce3f1f3bcd3d48e2151bc2eac34d3d523cb4c7f026fc3ab11662f5e7bad1b6732e71ff190259ec5cf7c5cd117bdb322b6f1c69be1f5cc9762d4241
-
SSDEEP
12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x46:IyHv5Z+Wzv7AiBll0OBWi6si9Gz
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2860-133-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral2/memory/2860-135-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral2/memory/2860-137-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral2/memory/2860-138-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral2/memory/2860-139-0x0000000000400000-0x00000000004F2000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exedescription pid process target process PID 4200 set thread context of 2860 4200 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exepid process 2860 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 2860 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 2860 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 2860 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 2860 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 2860 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exedescription pid process target process PID 4200 wrote to memory of 2860 4200 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe PID 4200 wrote to memory of 2860 4200 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe PID 4200 wrote to memory of 2860 4200 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe PID 4200 wrote to memory of 2860 4200 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe PID 4200 wrote to memory of 2860 4200 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe PID 4200 wrote to memory of 2860 4200 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe PID 4200 wrote to memory of 2860 4200 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe PID 4200 wrote to memory of 2860 4200 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe 619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe"C:\Users\Admin\AppData\Local\Temp\619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe"C:\Users\Admin\AppData\Local\Temp\619025618c271dd1ab0576ab25a800d2f1d3cdbd7a32d77486eca5360d080515.exe" Track="0001001000"2⤵
- Suspicious use of SetWindowsHookEx
PID:2860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2860-132-0x0000000000000000-mapping.dmp
-
memory/2860-133-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/2860-135-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/2860-137-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/2860-138-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/2860-139-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB