Analysis
-
max time kernel
164s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 14:40
Static task
static1
Behavioral task
behavioral1
Sample
eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec.exe
Resource
win10v2004-20220812-en
General
-
Target
eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec.exe
-
Size
231KB
-
MD5
f780458c5331d4e58d09f9363e7f641d
-
SHA1
0781cb65e390dade1110d0fe3e27caadd1dfd5da
-
SHA256
eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec
-
SHA512
0106e722ae70e519192008c348d3cedf245f05225a22fce37c45619f51a52a1f8f9f51db849ba619d58112c24d08caeaf6db2fa5b41110e7b12298d6e4bf8ca1
-
SSDEEP
6144:sa0eTLgMMHT7VTBqo0UxdgBzTLzAQ75lmIGLrDbLrDMdyFFNHe1/EhNzIjEfQqqb:sa00LIHTZTsaksh2EfVqnu
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6815cdb9 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{13CD2F6B-A3AD-4A72-BD8C-06666B088FAD}\\6815cdb9.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6815cdb9 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{13CD2F6B-A3AD-4A72-BD8C-06666B088FAD}\\6815cdb9.exe" explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3976 eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec.exe 3976 eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe Token: SeDebugPrivilege 1200 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3976 wrote to memory of 1200 3976 eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec.exe 80 PID 3976 wrote to memory of 1200 3976 eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec.exe 80 PID 3976 wrote to memory of 1200 3976 eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec.exe"C:\Users\Admin\AppData\Local\Temp\eb1ec377b6809568adcbf2a32af82ce4ee9116328187c3e59180ea24106539ec.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-