Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 04:48
Static task
static1
Behavioral task
behavioral1
Sample
43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe
Resource
win10v2004-20221111-en
General
-
Target
43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe
-
Size
148KB
-
MD5
48355fa3f4f63c208b84a94af3a84840
-
SHA1
8bd54d9f08fafda89a47e0890926ae0a3a1932db
-
SHA256
43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a
-
SHA512
c2c5e5d0fd5a6a0713b05bccbc526da61e81f4274568fff5264eb876495507fa2527746ac74b7b8cd6fe7df2d3b3b8a4ac6478169636ee4a4aed9be4542d657f
-
SSDEEP
3072:hIZWWxukZThtCdVBJvXIATEi+S9ofjh4BwL1/BKbcltbAX24X:hIIWxu+hOVTXIAQDSifjh4Bwx/B9ltKX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Screen Saver Pro 3.1 = "C:\\Users\\Admin\\AppData\\Roaming\\ScreenSaverPro.scr" 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1812 mspaint.exe 1812 mspaint.exe 1812 mspaint.exe 1812 mspaint.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1316 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 27 PID 1760 wrote to memory of 1316 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 27 PID 1760 wrote to memory of 1316 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 27 PID 1760 wrote to memory of 1316 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 27 PID 1760 wrote to memory of 1316 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 27 PID 1760 wrote to memory of 1316 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 27 PID 1760 wrote to memory of 1316 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 27 PID 1760 wrote to memory of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28 PID 1760 wrote to memory of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28 PID 1760 wrote to memory of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28 PID 1760 wrote to memory of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28 PID 1316 wrote to memory of 1812 1316 svchost.exe 29 PID 1316 wrote to memory of 1812 1316 svchost.exe 29 PID 1316 wrote to memory of 1812 1316 svchost.exe 29 PID 1316 wrote to memory of 1812 1316 svchost.exe 29 PID 1760 wrote to memory of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28 PID 1760 wrote to memory of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28 PID 1760 wrote to memory of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28 PID 1760 wrote to memory of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28 PID 1760 wrote to memory of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28 PID 1760 wrote to memory of 1196 1760 43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe"C:\Users\Admin\AppData\Local\Temp\43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe"3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
-
C:\Users\Admin\AppData\Local\Temp\43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe"C:\Users\Admin\AppData\Local\Temp\43eca0c1b6e74208f134d20ff283f983c030635433757dec8b9f15e0c4947c1a.exe"2⤵PID:1196
-