Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 16:44
Behavioral task
behavioral1
Sample
b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe
Resource
win10v2004-20220901-en
General
-
Target
b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe
-
Size
218KB
-
MD5
00c40ed16d7549561698a57d38de2d27
-
SHA1
53575cb2856fbf438db355a2aee8af7a01e9d38c
-
SHA256
b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c
-
SHA512
aa16fb450c8157366d1cf98c3af19a7970161feaf0920a9fcbb27fe71b96a3e3898b0557ea202b0ff45fd370ce3141c2e39400a45d3add27843b37575b797dee
-
SSDEEP
6144:pvsS3rsWqy7xglOsVAkgHiS1Sg9rYsk+RXSaPeBim:CS3XH7C9AkgBLNtSaP
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3436-132-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral2/memory/3436-133-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral2/memory/3436-137-0x0000000000400000-0x00000000004B2000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1648 cmd.exe -
Unexpected DNS network traffic destination 6 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Update = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Desktop\\Install\\{bfcb9398-bfb2-ca3f-1731-e604ea3da242}\\❤≸⋙\\Ⱒ☠⍨\\\u202eﯹ๛\\{bfcb9398-bfb2-ca3f-1731-e604ea3da242}\\GoogleUpdate.exe\" >" b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3436 set thread context of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 4844 set thread context of 1648 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 82 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 3048 Process not Found 3048 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe Token: SeDebugPrivilege 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe Token: SeDebugPrivilege 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe Token: SeDebugPrivilege 3048 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3048 Process not Found -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3436 wrote to memory of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 3436 wrote to memory of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 3436 wrote to memory of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 3436 wrote to memory of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 3436 wrote to memory of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 3436 wrote to memory of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 3436 wrote to memory of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 3436 wrote to memory of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 3436 wrote to memory of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 3436 wrote to memory of 4844 3436 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 81 PID 4844 wrote to memory of 1648 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 82 PID 4844 wrote to memory of 1648 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 82 PID 4844 wrote to memory of 1648 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 82 PID 4844 wrote to memory of 1648 4844 b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe"C:\Users\Admin\AppData\Local\Temp\b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe"C:\Users\Admin\AppData\Local\Temp\b99a7d37978877e1736243030dfe0c4a3da1ad1ca7edf296bc513c57e683575c.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Deletes itself
PID:1648
-
-