Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 15:03
Static task
static1
Behavioral task
behavioral1
Sample
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe
Resource
win10v2004-20220901-en
General
-
Target
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe
-
Size
263KB
-
MD5
b02ecc516834373f753b4a56428780f1
-
SHA1
9277f800d44bb7f9b184a8b517bcefc3a2dac752
-
SHA256
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613
-
SHA512
78dba7da8f9891299baf98f62c3b8f1991a4a8d52eac4e5d16c831dd5371aec4ba5800faeb188fca3bf170a83cd437f78445a5d309d1d2b4b80af4b698531535
-
SSDEEP
6144:dPfLIcvFM9DZIhYz4sBc/p7ESYyq33Z7EIKTkq:GvsiIQtHZWk
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6815cdb9 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{ADA9786A-03A1-4B26-8BFE-05C9969680FF}\\6815cdb9.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6815cdb9 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{ADA9786A-03A1-4B26-8BFE-05C9969680FF}\\6815cdb9.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exedescription pid process target process PID 760 set thread context of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
explorer.exepid process 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exepid process 4000 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe 4000 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe Token: SeDebugPrivilege 1456 explorer.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exec3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exedescription pid process target process PID 760 wrote to memory of 212 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 212 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 212 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 760 wrote to memory of 4000 760 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe PID 4000 wrote to memory of 1456 4000 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe explorer.exe PID 4000 wrote to memory of 1456 4000 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe explorer.exe PID 4000 wrote to memory of 1456 4000 c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe"C:\Users\Admin\AppData\Local\Temp\c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe"C:\Users\Admin\AppData\Local\Temp\c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe"2⤵PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe"C:\Users\Admin\AppData\Local\Temp\c3b3fcc4d911d24473bf0a1b42e93de250b4ecf1b74632158a54c68013403613.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-