Analysis
-
max time kernel
191s -
max time network
230s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 06:14
Static task
static1
Behavioral task
behavioral1
Sample
87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe
Resource
win10v2004-20220812-en
General
-
Target
87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe
-
Size
143KB
-
MD5
ca832ac1ffd75453a00e42ef0ecf312e
-
SHA1
297868cbb3ef13378884c245fb1379a227f4e002
-
SHA256
87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae
-
SHA512
718d62a6ab4b71d2138359de812e9d8e23c12c931ead636318d2f189c6ab0fb44cd023167a6ba9254094b100bddfff9401209f9322d3856ec6a163def532a7fb
-
SSDEEP
3072:Oe1PnFBhilZmLEcHbhP1esLu+02IFt0qAeLITqnihrF4MsyHka9XCBvFalK2:OAhilZmLXhPcsi+02o0qWOikmHEhFmK
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Deletes itself 1 IoCs
pid Process 1856 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1004 set thread context of 1212 1004 87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1004 87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe 1212 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1004 87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1212 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1212 svchost.exe 1212 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1004 wrote to memory of 1212 1004 87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe 28 PID 1004 wrote to memory of 1212 1004 87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe 28 PID 1004 wrote to memory of 1212 1004 87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe 28 PID 1004 wrote to memory of 1212 1004 87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe 28 PID 1004 wrote to memory of 1212 1004 87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe 28 PID 1004 wrote to memory of 1212 1004 87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe 28 PID 1212 wrote to memory of 1856 1212 svchost.exe 31 PID 1212 wrote to memory of 1856 1212 svchost.exe 31 PID 1212 wrote to memory of 1856 1212 svchost.exe 31 PID 1212 wrote to memory of 1856 1212 svchost.exe 31 PID 1212 wrote to memory of 1664 1212 svchost.exe 33 PID 1212 wrote to memory of 1664 1212 svchost.exe 33 PID 1212 wrote to memory of 1664 1212 svchost.exe 33 PID 1212 wrote to memory of 1664 1212 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe"C:\Users\Admin\AppData\Local\Temp\87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c for /l %i in (1, 1, 4000000000) do if not exist "C:\Users\Admin\AppData\Local\Temp\87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe" (exit) else (del /f "C:\Users\Admin\AppData\Local\Temp\87ccfaaca6392d92cf8632133db3a1cbc096f98960ad1218de92790bc68c83ae.exe")3⤵
- Deletes itself
PID:1856
-
-
C:\Windows\SysWOW64\ctfmon.exectfmon.exe3⤵PID:1664
-
-