Analysis
-
max time kernel
56s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 04:59
Static task
static1
Behavioral task
behavioral1
Sample
3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe
Resource
win10v2004-20221111-en
General
-
Target
3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe
-
Size
411KB
-
MD5
3313b1f293772f7310980f3b0ef93b90
-
SHA1
6e63c9cedb3cdfc35478979191a215ac9847afc9
-
SHA256
3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f
-
SHA512
2895fc2a8f9086a6546b960279c8644c21134ae990ba2e6674b35e31c726a5a37d28cfe83928560fe5be5d6330bc83477a8db6e11957178964c842cce8dd8b0f
-
SSDEEP
6144:9GK72EZbDOtFRJK4KRKivutOgKcIU4KAF7yHh3bM8:9pZbDGpiAHfOE5
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1768 xe4KjpOQJaRLmiY.exe 1436 xe4KjpOQJaRLmiY.exe -
Deletes itself 1 IoCs
pid Process 1436 xe4KjpOQJaRLmiY.exe -
Loads dropped DLL 4 IoCs
pid Process 960 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 960 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 960 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 1436 xe4KjpOQJaRLmiY.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\GUBka7jBVPaH = "C:\\ProgramData\\VwBEgtBI7p34maiZ\\xe4KjpOQJaRLmiY.exe" 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 564 set thread context of 960 564 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 28 PID 1768 set thread context of 1436 1768 xe4KjpOQJaRLmiY.exe 30 PID 1436 set thread context of 1444 1436 xe4KjpOQJaRLmiY.exe 31 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 564 wrote to memory of 960 564 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 28 PID 564 wrote to memory of 960 564 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 28 PID 564 wrote to memory of 960 564 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 28 PID 564 wrote to memory of 960 564 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 28 PID 564 wrote to memory of 960 564 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 28 PID 564 wrote to memory of 960 564 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 28 PID 960 wrote to memory of 1768 960 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 29 PID 960 wrote to memory of 1768 960 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 29 PID 960 wrote to memory of 1768 960 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 29 PID 960 wrote to memory of 1768 960 3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe 29 PID 1768 wrote to memory of 1436 1768 xe4KjpOQJaRLmiY.exe 30 PID 1768 wrote to memory of 1436 1768 xe4KjpOQJaRLmiY.exe 30 PID 1768 wrote to memory of 1436 1768 xe4KjpOQJaRLmiY.exe 30 PID 1768 wrote to memory of 1436 1768 xe4KjpOQJaRLmiY.exe 30 PID 1768 wrote to memory of 1436 1768 xe4KjpOQJaRLmiY.exe 30 PID 1768 wrote to memory of 1436 1768 xe4KjpOQJaRLmiY.exe 30 PID 1436 wrote to memory of 1444 1436 xe4KjpOQJaRLmiY.exe 31 PID 1436 wrote to memory of 1444 1436 xe4KjpOQJaRLmiY.exe 31 PID 1436 wrote to memory of 1444 1436 xe4KjpOQJaRLmiY.exe 31 PID 1436 wrote to memory of 1444 1436 xe4KjpOQJaRLmiY.exe 31 PID 1436 wrote to memory of 1444 1436 xe4KjpOQJaRLmiY.exe 31 PID 1436 wrote to memory of 1444 1436 xe4KjpOQJaRLmiY.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe"C:\Users\Admin\AppData\Local\Temp\3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe"C:\Users\Admin\AppData\Local\Temp\3deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:960 -
C:\ProgramData\VwBEgtBI7p34maiZ\xe4KjpOQJaRLmiY.exe"C:\ProgramData\VwBEgtBI7p34maiZ\xe4KjpOQJaRLmiY.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\ProgramData\VwBEgtBI7p34maiZ\xe4KjpOQJaRLmiY.exe"C:\ProgramData\VwBEgtBI7p34maiZ\xe4KjpOQJaRLmiY.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe" /i:14365⤵PID:1444
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5ce9fad414472c391f47eace4c70ff00e
SHA1752e258f03115ea624e89ae91cbe3ac508d46d3a
SHA2567db82115727dc24c529026dc4924bbf9d1746a2ceeb311795c218ae0dc0c70f5
SHA5127cb7d0a2a54b83b75cf7da3642c114e6c00fff8113229dbc1fe35911521dc16477c90871285b35a338c797f45758f7d811039272567a0e04b449fc16e9cf6451
-
Filesize
411KB
MD5ce9fad414472c391f47eace4c70ff00e
SHA1752e258f03115ea624e89ae91cbe3ac508d46d3a
SHA2567db82115727dc24c529026dc4924bbf9d1746a2ceeb311795c218ae0dc0c70f5
SHA5127cb7d0a2a54b83b75cf7da3642c114e6c00fff8113229dbc1fe35911521dc16477c90871285b35a338c797f45758f7d811039272567a0e04b449fc16e9cf6451
-
Filesize
411KB
MD5ce9fad414472c391f47eace4c70ff00e
SHA1752e258f03115ea624e89ae91cbe3ac508d46d3a
SHA2567db82115727dc24c529026dc4924bbf9d1746a2ceeb311795c218ae0dc0c70f5
SHA5127cb7d0a2a54b83b75cf7da3642c114e6c00fff8113229dbc1fe35911521dc16477c90871285b35a338c797f45758f7d811039272567a0e04b449fc16e9cf6451
-
Filesize
411KB
MD5ce9fad414472c391f47eace4c70ff00e
SHA1752e258f03115ea624e89ae91cbe3ac508d46d3a
SHA2567db82115727dc24c529026dc4924bbf9d1746a2ceeb311795c218ae0dc0c70f5
SHA5127cb7d0a2a54b83b75cf7da3642c114e6c00fff8113229dbc1fe35911521dc16477c90871285b35a338c797f45758f7d811039272567a0e04b449fc16e9cf6451
-
Filesize
411KB
MD5ce9fad414472c391f47eace4c70ff00e
SHA1752e258f03115ea624e89ae91cbe3ac508d46d3a
SHA2567db82115727dc24c529026dc4924bbf9d1746a2ceeb311795c218ae0dc0c70f5
SHA5127cb7d0a2a54b83b75cf7da3642c114e6c00fff8113229dbc1fe35911521dc16477c90871285b35a338c797f45758f7d811039272567a0e04b449fc16e9cf6451
-
Filesize
411KB
MD53313b1f293772f7310980f3b0ef93b90
SHA16e63c9cedb3cdfc35478979191a215ac9847afc9
SHA2563deadf1cf2074dcf6fd56bad067c1baa176e6ca167c4ae2b5c60b0c966044a9f
SHA5122895fc2a8f9086a6546b960279c8644c21134ae990ba2e6674b35e31c726a5a37d28cfe83928560fe5be5d6330bc83477a8db6e11957178964c842cce8dd8b0f
-
Filesize
411KB
MD5ce9fad414472c391f47eace4c70ff00e
SHA1752e258f03115ea624e89ae91cbe3ac508d46d3a
SHA2567db82115727dc24c529026dc4924bbf9d1746a2ceeb311795c218ae0dc0c70f5
SHA5127cb7d0a2a54b83b75cf7da3642c114e6c00fff8113229dbc1fe35911521dc16477c90871285b35a338c797f45758f7d811039272567a0e04b449fc16e9cf6451