Analysis
-
max time kernel
152s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2022, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe
Resource
win10v2004-20220812-en
General
-
Target
abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe
-
Size
104KB
-
MD5
0cca0a9d84e5abc0efaaca4b991d3602
-
SHA1
891cf4fbcbf2df3c7e80daae493a9d73f2e1ae71
-
SHA256
abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7
-
SHA512
7306ea85c8ab6da241e9613ae879d8a382302594ca56aeb92427cfc19abfa00e10fbd963f9217b96a786118425ad100e91817d9fab60b8ab28b232b73a54d0fc
-
SSDEEP
3072:og9R9vuSFtw+LMBR/EWu59Sv3bM/ykBYNb:oSXvRrwWeWWu5948ykBY9
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TabbtnEx = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\3565\\TabbtnEx.exe" netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2992 abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe 2992 abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2992 wrote to memory of 4320 2992 abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe 83 PID 2992 wrote to memory of 4320 2992 abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe 83 PID 2992 wrote to memory of 4320 2992 abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe"C:\Users\Admin\AppData\Local\Temp\abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Adds Run key to start application
PID:4320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD537c6390dd905b3159cc5be0b513360df
SHA1d1fc5d4c936a0e5d39492b8d8871a3ec551915a9
SHA25630bfe203488ff6f7f275ae0c4187467599b1b9005f01e48edd95d0feb8b842b0
SHA512cef48ef4725bd62ed5b4d36296fa047c48d842b6e9d5a2f16e9cbc11244cfa42088dd0cc47116c1c3a041c439026bb03a5ce73c2e3e05fae65d5efcffb526391
-
Filesize
206B
MD5b366779414fea684c7406f32baca6674
SHA1f30d27cf62880a4d07723b49cc83e263b1e0d86a
SHA25652c2dd00b72ed57386df8d7c0aa2aa7de0c54a981f563a8299f6d6c48cbbe66b
SHA512d37cfdbead10756d742bc157f602ab9a5e82ec87ba9b6bf025faf3f53f4625444e66b00c0d1f66e50b583c5ac5192c866acd550bfbaf369476fa65e2ddecb217