Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 15:03
Static task
static1
Behavioral task
behavioral1
Sample
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe
Resource
win10v2004-20220901-en
General
-
Target
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe
-
Size
263KB
-
MD5
b02ecc516834373f753b4a56428780f1
-
SHA1
9277f800d44bb7f9b184a8b517bcefc3a2dac752
-
SHA256
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613
-
SHA512
78dba7da8f9891299baf98f62c3b8f1991a4a8d52eac4e5d16c831dd5371aec4ba5800faeb188fca3bf170a83cd437f78445a5d309d1d2b4b80af4b698531535
-
SSDEEP
6144:dPfLIcvFM9DZIhYz4sBc/p7ESYyq33Z7EIKTkq:GvsiIQtHZWk
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{1DC3AF6C-D547-46F8-BDF5-5EE59458E932}\\f5ea51da.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{1DC3AF6C-D547-46F8-BDF5-5EE59458E932}\\f5ea51da.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exedescription pid process target process PID 1408 set thread context of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
explorer.exepid process 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe -
Suspicious behavior: MapViewOfSection 24 IoCs
Processes:
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exeexplorer.exepid process 824 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe 824 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe -
Suspicious use of AdjustPrivilegeToken 59 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeDebugPrivilege 672 explorer.exe Token: SeAssignPrimaryTokenPrivilege 868 Token: SeIncreaseQuotaPrivilege 868 Token: SeSecurityPrivilege 868 Token: SeTakeOwnershipPrivilege 868 Token: SeLoadDriverPrivilege 868 Token: SeRestorePrivilege 868 Token: SeSystemEnvironmentPrivilege 868 Token: SeAssignPrimaryTokenPrivilege 868 Token: SeIncreaseQuotaPrivilege 868 Token: SeSecurityPrivilege 868 Token: SeTakeOwnershipPrivilege 868 Token: SeLoadDriverPrivilege 868 Token: SeSystemtimePrivilege 868 Token: SeBackupPrivilege 868 Token: SeRestorePrivilege 868 Token: SeShutdownPrivilege 868 Token: SeSystemEnvironmentPrivilege 868 Token: SeUndockPrivilege 868 Token: SeManageVolumePrivilege 868 Token: SeAssignPrimaryTokenPrivilege 868 Token: SeIncreaseQuotaPrivilege 868 Token: SeSecurityPrivilege 868 Token: SeTakeOwnershipPrivilege 868 Token: SeLoadDriverPrivilege 868 Token: SeRestorePrivilege 868 Token: SeSystemEnvironmentPrivilege 868 Token: SeAssignPrimaryTokenPrivilege 868 Token: SeIncreaseQuotaPrivilege 868 Token: SeSecurityPrivilege 868 Token: SeTakeOwnershipPrivilege 868 Token: SeLoadDriverPrivilege 868 Token: SeRestorePrivilege 868 Token: SeSystemEnvironmentPrivilege 868 Token: SeAuditPrivilege 868 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1272 1272 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1272 1272 -
Suspicious use of UnmapMainImage 5 IoCs
Processes:
pid process 800 800 800 800 800 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exec3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exedescription pid process target process PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 1408 wrote to memory of 824 1408 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 824 wrote to memory of 672 824 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe explorer.exe PID 824 wrote to memory of 672 824 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe explorer.exe PID 824 wrote to memory of 672 824 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe explorer.exe PID 824 wrote to memory of 672 824 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe"C:\Users\Admin\AppData\Local\Temp\c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe"C:\Users\Admin\AppData\Local\Temp\c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-