Analysis
-
max time kernel
151s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 08:14
Static task
static1
Behavioral task
behavioral1
Sample
6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe
Resource
win10v2004-20220901-en
General
-
Target
6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe
-
Size
76KB
-
MD5
a9323511953602f66c23091e62c3ed72
-
SHA1
12b9be704c2390bf12e719c25ecc97baa5bd6fe8
-
SHA256
6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931
-
SHA512
0f872bfd43788ac4ea789875e85a92c088345057fcd7099aa4a8edef582165445c3bb73bff7f25e95e871b58bf8a80678242d0079a4b4550775ace61ded8ae06
-
SSDEEP
1536:y2La14dKCK4U4R7Dt1hwtlLNIRh1nlDD6Y:yZ14dKCK4lR7Dt1I/efl36Y
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\msconfig.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1756 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 1308 explorer.exe 1404 Explorer.EXE 836 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 1756 1980 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 28 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1756 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 1756 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe 836 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1756 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 1756 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1404 Explorer.EXE 1404 Explorer.EXE 1404 Explorer.EXE 1404 Explorer.EXE 1052 ctfmon.exe 1404 Explorer.EXE 1404 Explorer.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1404 Explorer.EXE 1404 Explorer.EXE 1404 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 836 svchost.exe 836 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1756 1980 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 28 PID 1980 wrote to memory of 1756 1980 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 28 PID 1980 wrote to memory of 1756 1980 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 28 PID 1980 wrote to memory of 1756 1980 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 28 PID 1980 wrote to memory of 1756 1980 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 28 PID 1980 wrote to memory of 1756 1980 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 28 PID 1980 wrote to memory of 1756 1980 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 28 PID 1980 wrote to memory of 1756 1980 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 28 PID 1980 wrote to memory of 1756 1980 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 28 PID 1756 wrote to memory of 1308 1756 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 29 PID 1756 wrote to memory of 1308 1756 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 29 PID 1756 wrote to memory of 1308 1756 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 29 PID 1756 wrote to memory of 1308 1756 6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe 29 PID 1308 wrote to memory of 1404 1308 explorer.exe 14 PID 1404 wrote to memory of 836 1404 Explorer.EXE 30 PID 1404 wrote to memory of 836 1404 Explorer.EXE 30 PID 1404 wrote to memory of 836 1404 Explorer.EXE 30 PID 1404 wrote to memory of 836 1404 Explorer.EXE 30 PID 1404 wrote to memory of 836 1404 Explorer.EXE 30 PID 836 wrote to memory of 1052 836 svchost.exe 31 PID 836 wrote to memory of 1052 836 svchost.exe 31 PID 836 wrote to memory of 1052 836 svchost.exe 31 PID 836 wrote to memory of 1052 836 svchost.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe"C:\Users\Admin\AppData\Local\Temp\6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe"C:\Users\Admin\AppData\Local\Temp\6a6883cba3af716b2593447ddb61b2fac8cfa44ec3d4692675fa6f82ad31a931.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1308
-
-
-
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe3⤵
- Suspicious use of FindShellTrayWindow
PID:1052
-
-
Network
-
Remote address:8.8.8.8:53Requesttdzzf.ruIN AResponse
-
Remote address:8.8.8.8:53Requestcxcyp.suIN AResponse