Analysis
-
max time kernel
152s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 15:49
Static task
static1
Behavioral task
behavioral1
Sample
d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe
Resource
win10v2004-20220812-en
General
-
Target
d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe
-
Size
616KB
-
MD5
c8577fe52013e70673c5d793da43194d
-
SHA1
e13ace6b4d32e340f9219431e996ca395631b122
-
SHA256
d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3
-
SHA512
1063f7b25f82d0dc2d2a27da5c5130e5ad04b1d8bc7e798f7d953b080c951f7df552d4563f5650ab18bd1b4aa20571fbb76670ff41519b2bb32c76e87849445b
-
SSDEEP
12288:SpodR/4DyEDgKDr3vhja4sVJdVfeUR4+WSsTdSKel7EOYCAmBeCeezee:HRAWVsr/GVS+W5SKelHA
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Update = "C:\\Users\\Admin\\AppData\\Roaming\\Win Update\\Win Update.exe" d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe File opened for modification C:\Windows\assembly\Desktop.ini d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 4676 2252 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe 83 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe File opened for modification C:\Windows\assembly\Desktop.ini d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe File opened for modification C:\Windows\assembly d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4676 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4676 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4676 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2252 wrote to memory of 4676 2252 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe 83 PID 2252 wrote to memory of 4676 2252 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe 83 PID 2252 wrote to memory of 4676 2252 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe 83 PID 2252 wrote to memory of 4676 2252 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe 83 PID 2252 wrote to memory of 4676 2252 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe 83 PID 2252 wrote to memory of 4676 2252 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe 83 PID 2252 wrote to memory of 4676 2252 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe 83 PID 2252 wrote to memory of 4676 2252 d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe"C:\Users\Admin\AppData\Local\Temp\d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe"C:\Users\Admin\AppData\Local\Temp\d4c284ac85b32284010fa7129709f7c29ba0c6ff7beeb0cbd1a52da3c43631a3.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4676
-