Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 03:59
Static task
static1
Behavioral task
behavioral1
Sample
a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe
Resource
win10v2004-20220812-en
General
-
Target
a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe
-
Size
69KB
-
MD5
d8ff54c058c80f42c262124e0ad582a9
-
SHA1
186c44abfeac9dbc7131ee6294168634b59c7a8d
-
SHA256
a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b
-
SHA512
8e4ad620b4e26f8955a03b0751b378b1b966359c63f0cdc9380dfff0587f0275584248242600fa3a5e5faae1ea41e88a2b792291cfc539e7de9c10a1e3a3a8b2
-
SSDEEP
1536:OYEiFMLao04I0QoWQII3dRlObu8x7Q5I/R:XEiFvo04jQuP3ROK8xQ5Ip
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\msconfig.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1076 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 1760 explorer.exe 1296 Explorer.EXE 1420 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1956 set thread context of 1076 1956 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 27 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 1076 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1076 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 1076 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1296 Explorer.EXE 1296 Explorer.EXE 1296 Explorer.EXE 1296 Explorer.EXE 820 ctfmon.exe 1296 Explorer.EXE 1296 Explorer.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1296 Explorer.EXE 1296 Explorer.EXE 1296 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1420 svchost.exe 1420 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1076 1956 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 27 PID 1956 wrote to memory of 1076 1956 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 27 PID 1956 wrote to memory of 1076 1956 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 27 PID 1956 wrote to memory of 1076 1956 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 27 PID 1956 wrote to memory of 1076 1956 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 27 PID 1956 wrote to memory of 1076 1956 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 27 PID 1956 wrote to memory of 1076 1956 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 27 PID 1956 wrote to memory of 1076 1956 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 27 PID 1956 wrote to memory of 1076 1956 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 27 PID 1076 wrote to memory of 1760 1076 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 28 PID 1076 wrote to memory of 1760 1076 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 28 PID 1076 wrote to memory of 1760 1076 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 28 PID 1076 wrote to memory of 1760 1076 a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe 28 PID 1760 wrote to memory of 1296 1760 explorer.exe 15 PID 1296 wrote to memory of 1420 1296 Explorer.EXE 29 PID 1296 wrote to memory of 1420 1296 Explorer.EXE 29 PID 1296 wrote to memory of 1420 1296 Explorer.EXE 29 PID 1296 wrote to memory of 1420 1296 Explorer.EXE 29 PID 1296 wrote to memory of 1420 1296 Explorer.EXE 29 PID 1420 wrote to memory of 820 1420 svchost.exe 30 PID 1420 wrote to memory of 820 1420 svchost.exe 30 PID 1420 wrote to memory of 820 1420 svchost.exe 30 PID 1420 wrote to memory of 820 1420 svchost.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe"C:\Users\Admin\AppData\Local\Temp\a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe"C:\Users\Admin\AppData\Local\Temp\a52b3d6de13c19bc415282ea6084984720bf453a7b7347185f49e66946ddff4b.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1760
-
-
-
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe3⤵
- Suspicious use of FindShellTrayWindow
PID:820
-
-