Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 07:38
Static task
static1
Behavioral task
behavioral1
Sample
b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a.exe
Resource
win10v2004-20220812-en
General
-
Target
b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a.exe
-
Size
213KB
-
MD5
c891fb2c35cb2a1ebd19f877ea058293
-
SHA1
616d8bbc62c613049e474a5c84ee498ba3005bcc
-
SHA256
b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a
-
SHA512
815aaaf96cc40388ba8491674e61a1ea30c790aa13671796cb6dfb67e61817e0f575e82fb1238d59caeae4ef213dcae88efb06c2e66cad002199c3bee85c8c3c
-
SSDEEP
3072:MRb3lRU5tngTkdny5g4fX6y9c0qKyBQJvU4MrHDqeXsGKLu8F3HOwE2U:607wkd6g4fX6Qc8yeNUhrpXsGKLu8Nr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\template.xml" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a.exesvchost.exepid process 5056 b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a.exe 1672 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a.exepid process 5056 b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a.exe 5056 b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a.exe"C:\Users\Admin\AppData\Local\Temp\b1fa12e105c978c84bfd398fcc6549d602fd9986f4af3895cf5073a06187243a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:5056
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1672