Analysis
-
max time kernel
150s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe
Resource
win10v2004-20220812-en
General
-
Target
6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe
-
Size
501KB
-
MD5
25983e6283964d0b6ef1e1025d0a82b2
-
SHA1
083bc8f79f85741dd3df0aa4b41730bdbf0a58ff
-
SHA256
6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a
-
SHA512
2d12e2595c72cd6ce9a088824acd3aa6e66a450bc4d0777b3e285d00151d97cf29beab89e0eb49966bde595fd7e2e52e93d858c9ece5ec33d3a2cdd0b65106e6
-
SSDEEP
6144:pdNszUtPwxSm/yHj4jwoHW+srKkoU1dxoiHfZYHU5Q1p:p6VEm/Oa6KkT1dqOfyn1p
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4852 bJCXnyez8.exe 508 bJCXnyez8.exe -
Loads dropped DLL 4 IoCs
pid Process 4840 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 4840 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 508 bJCXnyez8.exe 508 bJCXnyez8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lUdc5gsAgxXcEUkV = "C:\\ProgramData\\PspzAqBVMBfCAfe\\bJCXnyez8.exe" 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4636 set thread context of 4840 4636 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 83 PID 4852 set thread context of 508 4852 bJCXnyez8.exe 85 PID 508 set thread context of 1208 508 bJCXnyez8.exe 87 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4840 4636 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 83 PID 4636 wrote to memory of 4840 4636 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 83 PID 4636 wrote to memory of 4840 4636 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 83 PID 4636 wrote to memory of 4840 4636 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 83 PID 4636 wrote to memory of 4840 4636 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 83 PID 4840 wrote to memory of 4852 4840 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 84 PID 4840 wrote to memory of 4852 4840 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 84 PID 4840 wrote to memory of 4852 4840 6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe 84 PID 4852 wrote to memory of 508 4852 bJCXnyez8.exe 85 PID 4852 wrote to memory of 508 4852 bJCXnyez8.exe 85 PID 4852 wrote to memory of 508 4852 bJCXnyez8.exe 85 PID 4852 wrote to memory of 508 4852 bJCXnyez8.exe 85 PID 4852 wrote to memory of 508 4852 bJCXnyez8.exe 85 PID 508 wrote to memory of 1208 508 bJCXnyez8.exe 87 PID 508 wrote to memory of 1208 508 bJCXnyez8.exe 87 PID 508 wrote to memory of 1208 508 bJCXnyez8.exe 87 PID 508 wrote to memory of 1208 508 bJCXnyez8.exe 87 PID 508 wrote to memory of 1208 508 bJCXnyez8.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe"C:\Users\Admin\AppData\Local\Temp\6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe"C:\Users\Admin\AppData\Local\Temp\6c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\ProgramData\PspzAqBVMBfCAfe\bJCXnyez8.exe"C:\ProgramData\PspzAqBVMBfCAfe\bJCXnyez8.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\ProgramData\PspzAqBVMBfCAfe\bJCXnyez8.exe"C:\ProgramData\PspzAqBVMBfCAfe\bJCXnyez8.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe" /i:5085⤵PID:1208
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD525983e6283964d0b6ef1e1025d0a82b2
SHA1083bc8f79f85741dd3df0aa4b41730bdbf0a58ff
SHA2566c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a
SHA5122d12e2595c72cd6ce9a088824acd3aa6e66a450bc4d0777b3e285d00151d97cf29beab89e0eb49966bde595fd7e2e52e93d858c9ece5ec33d3a2cdd0b65106e6
-
Filesize
501KB
MD525983e6283964d0b6ef1e1025d0a82b2
SHA1083bc8f79f85741dd3df0aa4b41730bdbf0a58ff
SHA2566c8bfec9206ae986edc65d58c08abd310ef4ab15e49d0633fc042712a46eb21a
SHA5122d12e2595c72cd6ce9a088824acd3aa6e66a450bc4d0777b3e285d00151d97cf29beab89e0eb49966bde595fd7e2e52e93d858c9ece5ec33d3a2cdd0b65106e6
-
Filesize
501KB
MD5f939bb0ec326cafe63b96d81248bbb53
SHA1bf98de99f42eda08a2f3d67e651eeb8277000c7b
SHA256bba24c8e19dd81ca9700974a56a96aa997030fcfedd6a42fb3b6b4b6e27b9bc6
SHA5126d38ec59eacc87a257b8cadd6aed4d5fd827d704b3e17bdb1fd90cd00f2e59b065fc78ed8b2277705c2daca8ee2d3a31d11c456af950f6da24f88fe09fd7a900
-
Filesize
501KB
MD5f939bb0ec326cafe63b96d81248bbb53
SHA1bf98de99f42eda08a2f3d67e651eeb8277000c7b
SHA256bba24c8e19dd81ca9700974a56a96aa997030fcfedd6a42fb3b6b4b6e27b9bc6
SHA5126d38ec59eacc87a257b8cadd6aed4d5fd827d704b3e17bdb1fd90cd00f2e59b065fc78ed8b2277705c2daca8ee2d3a31d11c456af950f6da24f88fe09fd7a900
-
Filesize
501KB
MD5f939bb0ec326cafe63b96d81248bbb53
SHA1bf98de99f42eda08a2f3d67e651eeb8277000c7b
SHA256bba24c8e19dd81ca9700974a56a96aa997030fcfedd6a42fb3b6b4b6e27b9bc6
SHA5126d38ec59eacc87a257b8cadd6aed4d5fd827d704b3e17bdb1fd90cd00f2e59b065fc78ed8b2277705c2daca8ee2d3a31d11c456af950f6da24f88fe09fd7a900
-
Filesize
501KB
MD5f939bb0ec326cafe63b96d81248bbb53
SHA1bf98de99f42eda08a2f3d67e651eeb8277000c7b
SHA256bba24c8e19dd81ca9700974a56a96aa997030fcfedd6a42fb3b6b4b6e27b9bc6
SHA5126d38ec59eacc87a257b8cadd6aed4d5fd827d704b3e17bdb1fd90cd00f2e59b065fc78ed8b2277705c2daca8ee2d3a31d11c456af950f6da24f88fe09fd7a900
-
Filesize
501KB
MD5f939bb0ec326cafe63b96d81248bbb53
SHA1bf98de99f42eda08a2f3d67e651eeb8277000c7b
SHA256bba24c8e19dd81ca9700974a56a96aa997030fcfedd6a42fb3b6b4b6e27b9bc6
SHA5126d38ec59eacc87a257b8cadd6aed4d5fd827d704b3e17bdb1fd90cd00f2e59b065fc78ed8b2277705c2daca8ee2d3a31d11c456af950f6da24f88fe09fd7a900