Analysis
-
max time kernel
174s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 00:15
Static task
static1
Behavioral task
behavioral1
Sample
Vídeo pra ti linda.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Vídeo pra ti linda.exe
Resource
win10v2004-20221111-en
General
-
Target
Vídeo pra ti linda.exe
-
Size
436KB
-
MD5
564588d16ce970daed4c7ab47586a3cd
-
SHA1
6ced2688bf14f9a2100fa9fed373463e22a44197
-
SHA256
840cd90d14a700e56a4ea5e918afe6403ccb83a42ffa694fe4d67a98346d6a41
-
SHA512
7e95d146534b5c21b788f18f69b7017a9e32003d1272cf03e0ac95f5fa374416b1ff0626fb25a0aea74ae8f8df48ae2dba58b17274c51b2a342147aff81383f8
-
SSDEEP
6144:we5gYGeytpBD/sMd6Qh/r/wHpj17C/d0dw2U2O35h5pIntBy2bk/RmNcG+U1XHNp:wfYGey36iwJjVvt1O3H5StBzwpsX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\Zobim\\Zobim\\1.0.0.0\\WindowsUpdate.exe\"" Vídeo pra ti linda.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini Vídeo pra ti linda.exe File opened for modification C:\Windows\assembly\Desktop.ini Vídeo pra ti linda.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2952 set thread context of 1720 2952 Vídeo pra ti linda.exe 86 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly Vídeo pra ti linda.exe File created C:\Windows\assembly\Desktop.ini Vídeo pra ti linda.exe File opened for modification C:\Windows\assembly\Desktop.ini Vídeo pra ti linda.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1720 Vídeo pra ti linda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1720 Vídeo pra ti linda.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1720 Vídeo pra ti linda.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2952 wrote to memory of 1720 2952 Vídeo pra ti linda.exe 86 PID 2952 wrote to memory of 1720 2952 Vídeo pra ti linda.exe 86 PID 2952 wrote to memory of 1720 2952 Vídeo pra ti linda.exe 86 PID 2952 wrote to memory of 1720 2952 Vídeo pra ti linda.exe 86 PID 2952 wrote to memory of 1720 2952 Vídeo pra ti linda.exe 86 PID 2952 wrote to memory of 1720 2952 Vídeo pra ti linda.exe 86 PID 2952 wrote to memory of 1720 2952 Vídeo pra ti linda.exe 86 PID 2952 wrote to memory of 1720 2952 Vídeo pra ti linda.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vídeo pra ti linda.exe"C:\Users\Admin\AppData\Local\Temp\Vídeo pra ti linda.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Vídeo pra ti linda.exe"C:\Users\Admin\AppData\Local\Temp\Vídeo pra ti linda.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
951B
MD5b1e908949595b7d6f11abbe90946c870
SHA1548c855c1ed0f6ef4e1e32d88d15756d87aa5ba4
SHA256618650b0b7181f886931f5902a23256c15aca21e80726c96f73870a2febd30db
SHA512f096a1159e8888f8b7fc01bf63b4945e075dc7abe2d40676ffe2159292e6e4e53239e6290a7973aecb7910292175504e773016cb8dd8eb615debcc8514a973b9