Analysis
-
max time kernel
215s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe
Resource
win10v2004-20220812-en
General
-
Target
7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe
-
Size
190KB
-
MD5
d805d969a859002181596ec1e7dd2feb
-
SHA1
bbebddac95bca878b1299f4d4e2c82aba0b8acc6
-
SHA256
7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05
-
SHA512
795c21470d5f4cc071e83410d57472409ea8e0bbc59d4b98d0333f3872f49c78eaf40ae7239f0ef07d03a8547f7a817ec444ec116d88ffdbeea0b35c25ad0674
-
SSDEEP
3072:q+fdo40V6a9Ng9QNUwGW0zW/u/vvK09JzvZYTSrxqWNxK:q+fHwK9Thy/qvmqx8
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cvzGO4WEtsg.exe 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cvzGO4WEtsg.exe 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 544 set thread context of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1472 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1472 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1472 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 544 wrote to memory of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 PID 544 wrote to memory of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 PID 544 wrote to memory of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 PID 544 wrote to memory of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 PID 544 wrote to memory of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 PID 544 wrote to memory of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 PID 544 wrote to memory of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 PID 544 wrote to memory of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 PID 544 wrote to memory of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 PID 544 wrote to memory of 1472 544 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 28 PID 1472 wrote to memory of 1504 1472 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 29 PID 1472 wrote to memory of 1504 1472 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 29 PID 1472 wrote to memory of 1504 1472 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 29 PID 1472 wrote to memory of 1504 1472 7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe"C:\Users\Admin\AppData\Local\Temp\7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe"C:\Users\Admin\AppData\Local\Temp\7743711f0b83dba511ea6c042947ccbb24e97e277107acfad6620dd09e491d05.exe"2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:1504
-
-