Analysis
-
max time kernel
181s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 05:29
Static task
static1
Behavioral task
behavioral1
Sample
90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe
Resource
win10v2004-20221111-en
General
-
Target
90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe
-
Size
82KB
-
MD5
58c27bd99bdbf14ddfbe9ede173e01ad
-
SHA1
6146e72db55f105a8fc0bba9cac1c17f9613419d
-
SHA256
90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56
-
SHA512
26ba9fecb3e4791a964087a7823c1bb0ff6c9c5797b91b1d295419bcb7645695f6aa86c9c7636ccbbf57e1ec1d70e5482ecbc414ffa18ebdd43463b8803dfcf2
-
SSDEEP
768:DL2EInkeC3sb/swTaYQ3knkMdNk77x0QSJ0oTHSPcO/QXa1gLa1r:eEuke33a10nkMd67y9HSPcoKRLap
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\msconfig.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 900 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 1276 explorer.exe 1204 Explorer.EXE 1064 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 948 set thread context of 900 948 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 28 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 900 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 900 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe 1064 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 900 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 900 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1204 Explorer.EXE -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 696 ctfmon.exe 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1064 svchost.exe 1064 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 948 wrote to memory of 900 948 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 28 PID 948 wrote to memory of 900 948 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 28 PID 948 wrote to memory of 900 948 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 28 PID 948 wrote to memory of 900 948 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 28 PID 948 wrote to memory of 900 948 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 28 PID 948 wrote to memory of 900 948 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 28 PID 948 wrote to memory of 900 948 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 28 PID 948 wrote to memory of 900 948 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 28 PID 948 wrote to memory of 900 948 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 28 PID 900 wrote to memory of 1276 900 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 29 PID 900 wrote to memory of 1276 900 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 29 PID 900 wrote to memory of 1276 900 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 29 PID 900 wrote to memory of 1276 900 90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe 29 PID 1276 wrote to memory of 1204 1276 explorer.exe 18 PID 1204 wrote to memory of 1064 1204 Explorer.EXE 30 PID 1204 wrote to memory of 1064 1204 Explorer.EXE 30 PID 1204 wrote to memory of 1064 1204 Explorer.EXE 30 PID 1204 wrote to memory of 1064 1204 Explorer.EXE 30 PID 1204 wrote to memory of 1064 1204 Explorer.EXE 30 PID 1064 wrote to memory of 696 1064 svchost.exe 31 PID 1064 wrote to memory of 696 1064 svchost.exe 31 PID 1064 wrote to memory of 696 1064 svchost.exe 31 PID 1064 wrote to memory of 696 1064 svchost.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe"C:\Users\Admin\AppData\Local\Temp\90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe"C:\Users\Admin\AppData\Local\Temp\90b1526d675c417640d1a5313aee6957d1a2a2f3ddb7a7bbc276330007bfdb56.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1276
-
-
-
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe3⤵
- Suspicious use of FindShellTrayWindow
PID:696
-
-