Analysis
-
max time kernel
166s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
7abffb22a85ce4197a896afc1fd033d18b6278bb4b053d241e1616bb3f69062d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7abffb22a85ce4197a896afc1fd033d18b6278bb4b053d241e1616bb3f69062d.exe
Resource
win10v2004-20220812-en
General
-
Target
7abffb22a85ce4197a896afc1fd033d18b6278bb4b053d241e1616bb3f69062d.exe
-
Size
58KB
-
MD5
052b8bd1e6f6220b6c9689dcb6311630
-
SHA1
36542cbf913333c393808be1a6552da42d04371e
-
SHA256
7abffb22a85ce4197a896afc1fd033d18b6278bb4b053d241e1616bb3f69062d
-
SHA512
c97b1dadc1cfae9c5f2fb03c666cee50ba5ae25af3fd1f5dfabd134b4960fab4bf0cd3f9448756b4e2fb386a539870053527577eab67c29a7e23493c8d2000e9
-
SSDEEP
1536:zd35348OJzHt7AZY5XEhdUpoFlYUkdr4EdW6H0w2:zdN48OFBHOAoTYlr0i0w
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1788 7abffb22a85ce4197a896afc1fd033d18b6278bb4b053d241e1616bb3f69062d.exe 2044 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1788 7abffb22a85ce4197a896afc1fd033d18b6278bb4b053d241e1616bb3f69062d.exe 1788 7abffb22a85ce4197a896afc1fd033d18b6278bb4b053d241e1616bb3f69062d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2044 svchost.exe 2044 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1460 2044 svchost.exe 29 PID 2044 wrote to memory of 1460 2044 svchost.exe 29 PID 2044 wrote to memory of 1460 2044 svchost.exe 29 PID 2044 wrote to memory of 1460 2044 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7abffb22a85ce4197a896afc1fd033d18b6278bb4b053d241e1616bb3f69062d.exe"C:\Users\Admin\AppData\Local\Temp\7abffb22a85ce4197a896afc1fd033d18b6278bb4b053d241e1616bb3f69062d.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:1788
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:1460
-