Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe
Resource
win10v2004-20220901-en
General
-
Target
6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe
-
Size
336KB
-
MD5
4db63070962478128495071dee3ce1d6
-
SHA1
cc7d11becaf292032c22663a0647e1bb897133de
-
SHA256
6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a
-
SHA512
38730978ae68b4bd221cd9de415eddf37ef0e99a77d3b10258f625ecbb918fa5a7191b5bc10f48bd219731a89a7fe99a8a9fd873f5e31ccaf344ad78f8fb1e39
-
SSDEEP
6144:3IwfiY18uqrjJTnBFXpEUi7u46NrEZideXyW63F:3d1PqnFB/i7u4orEUdeiW63F
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3516 bQDMxC2u8TI.exe 1008 bQDMxC2u8TI.exe -
Loads dropped DLL 4 IoCs
pid Process 2976 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 2976 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 1008 bQDMxC2u8TI.exe 1008 bQDMxC2u8TI.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\63Rjrk3yO9to3Hd = "C:\\ProgramData\\sveCR6GREg\\bQDMxC2u8TI.exe" 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5036 set thread context of 2976 5036 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 81 PID 3516 set thread context of 1008 3516 bQDMxC2u8TI.exe 85 PID 1008 set thread context of 3756 1008 bQDMxC2u8TI.exe 87 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5036 wrote to memory of 2976 5036 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 81 PID 5036 wrote to memory of 2976 5036 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 81 PID 5036 wrote to memory of 2976 5036 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 81 PID 5036 wrote to memory of 2976 5036 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 81 PID 5036 wrote to memory of 2976 5036 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 81 PID 2976 wrote to memory of 3516 2976 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 82 PID 2976 wrote to memory of 3516 2976 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 82 PID 2976 wrote to memory of 3516 2976 6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe 82 PID 3516 wrote to memory of 1008 3516 bQDMxC2u8TI.exe 85 PID 3516 wrote to memory of 1008 3516 bQDMxC2u8TI.exe 85 PID 3516 wrote to memory of 1008 3516 bQDMxC2u8TI.exe 85 PID 3516 wrote to memory of 1008 3516 bQDMxC2u8TI.exe 85 PID 3516 wrote to memory of 1008 3516 bQDMxC2u8TI.exe 85 PID 1008 wrote to memory of 3756 1008 bQDMxC2u8TI.exe 87 PID 1008 wrote to memory of 3756 1008 bQDMxC2u8TI.exe 87 PID 1008 wrote to memory of 3756 1008 bQDMxC2u8TI.exe 87 PID 1008 wrote to memory of 3756 1008 bQDMxC2u8TI.exe 87 PID 1008 wrote to memory of 3756 1008 bQDMxC2u8TI.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe"C:\Users\Admin\AppData\Local\Temp\6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe"C:\Users\Admin\AppData\Local\Temp\6af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\ProgramData\sveCR6GREg\bQDMxC2u8TI.exe"C:\ProgramData\sveCR6GREg\bQDMxC2u8TI.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\ProgramData\sveCR6GREg\bQDMxC2u8TI.exe"C:\ProgramData\sveCR6GREg\bQDMxC2u8TI.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe"C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe" /i:10085⤵PID:3756
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD52e8b1e27e774fbbb9552e922000eb13b
SHA161f50dc9e65de0ea6e8f60c7a09d7057041819ee
SHA25694388e96f68cd383730f73a4b2f463b019701ff8326cc08ffdf3e229efa22537
SHA5128038beef5da28279343be1681a8caf65262ae10efd05d77c568b8cfa2c046eabcb38e35b3a014f109a016992bb466caa4fa373d4f1742242eb10150e0deaae5b
-
Filesize
336KB
MD52e8b1e27e774fbbb9552e922000eb13b
SHA161f50dc9e65de0ea6e8f60c7a09d7057041819ee
SHA25694388e96f68cd383730f73a4b2f463b019701ff8326cc08ffdf3e229efa22537
SHA5128038beef5da28279343be1681a8caf65262ae10efd05d77c568b8cfa2c046eabcb38e35b3a014f109a016992bb466caa4fa373d4f1742242eb10150e0deaae5b
-
Filesize
336KB
MD52e8b1e27e774fbbb9552e922000eb13b
SHA161f50dc9e65de0ea6e8f60c7a09d7057041819ee
SHA25694388e96f68cd383730f73a4b2f463b019701ff8326cc08ffdf3e229efa22537
SHA5128038beef5da28279343be1681a8caf65262ae10efd05d77c568b8cfa2c046eabcb38e35b3a014f109a016992bb466caa4fa373d4f1742242eb10150e0deaae5b
-
Filesize
336KB
MD54db63070962478128495071dee3ce1d6
SHA1cc7d11becaf292032c22663a0647e1bb897133de
SHA2566af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a
SHA51238730978ae68b4bd221cd9de415eddf37ef0e99a77d3b10258f625ecbb918fa5a7191b5bc10f48bd219731a89a7fe99a8a9fd873f5e31ccaf344ad78f8fb1e39
-
Filesize
336KB
MD54db63070962478128495071dee3ce1d6
SHA1cc7d11becaf292032c22663a0647e1bb897133de
SHA2566af7df4f8250b9910aa139a2b27a93a4cdf332df8b19f96c42f2d88d84c0a97a
SHA51238730978ae68b4bd221cd9de415eddf37ef0e99a77d3b10258f625ecbb918fa5a7191b5bc10f48bd219731a89a7fe99a8a9fd873f5e31ccaf344ad78f8fb1e39
-
Filesize
336KB
MD52e8b1e27e774fbbb9552e922000eb13b
SHA161f50dc9e65de0ea6e8f60c7a09d7057041819ee
SHA25694388e96f68cd383730f73a4b2f463b019701ff8326cc08ffdf3e229efa22537
SHA5128038beef5da28279343be1681a8caf65262ae10efd05d77c568b8cfa2c046eabcb38e35b3a014f109a016992bb466caa4fa373d4f1742242eb10150e0deaae5b
-
Filesize
336KB
MD52e8b1e27e774fbbb9552e922000eb13b
SHA161f50dc9e65de0ea6e8f60c7a09d7057041819ee
SHA25694388e96f68cd383730f73a4b2f463b019701ff8326cc08ffdf3e229efa22537
SHA5128038beef5da28279343be1681a8caf65262ae10efd05d77c568b8cfa2c046eabcb38e35b3a014f109a016992bb466caa4fa373d4f1742242eb10150e0deaae5b