Analysis
-
max time kernel
176s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 09:33
Static task
static1
Behavioral task
behavioral1
Sample
486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe
Resource
win10v2004-20220812-en
General
-
Target
486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe
-
Size
244KB
-
MD5
796fdae3b1476ed20cdac74ca9d40973
-
SHA1
1067f53a9e67a61f41d649874e7c40a1e0a2cb2e
-
SHA256
486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b
-
SHA512
1948b409fa2d680708ca8b839576597d24bd7a90537c7dd07f22c08ce9edd775153d00ace206565bd6012803347c9be253db04206fbb36e85e9b0997a2c39157
-
SSDEEP
6144:AhBgQhoowwzLDmJYIdzNjlIccwO33XdGaSb:Ah2QhpNKJYIdzNjcndGaA
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
explorer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a134133.exe explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*13413 = "C:\\a134133\\a134133.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a134133 = "C:\\Users\\Admin\\AppData\\Roaming\\a134133.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*134133 = "C:\\Users\\Admin\\AppData\\Roaming\\a134133.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a13413 = "C:\\a134133\\a134133.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exedescription pid process target process PID 3576 set thread context of 776 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exepid process 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exeexplorer.exepid process 776 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 5068 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exepid process 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exeexplorer.exedescription pid process target process PID 3576 wrote to memory of 776 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe PID 3576 wrote to memory of 776 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe PID 3576 wrote to memory of 776 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe PID 3576 wrote to memory of 776 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe PID 3576 wrote to memory of 776 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe PID 3576 wrote to memory of 776 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe PID 3576 wrote to memory of 776 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe PID 3576 wrote to memory of 776 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe PID 3576 wrote to memory of 776 3576 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe PID 776 wrote to memory of 5068 776 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe explorer.exe PID 776 wrote to memory of 5068 776 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe explorer.exe PID 776 wrote to memory of 5068 776 486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe explorer.exe PID 5068 wrote to memory of 5036 5068 explorer.exe svchost.exe PID 5068 wrote to memory of 5036 5068 explorer.exe svchost.exe PID 5068 wrote to memory of 5036 5068 explorer.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe"C:\Users\Admin\AppData\Local\Temp\486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exeC:\Users\Admin\AppData\Local\Temp\486763428440e24a5ffb2a2b0fb799602c6e73d494efe853b306100555abc69b.exe2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"3⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\svchost.exe-k netsvcs4⤵PID:5036
-
-
-