Analysis
-
max time kernel
258s -
max time network
332s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
289ab98c80d2cb34474031916f47677367be6ab4e98517c4811201076ffdc69f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
289ab98c80d2cb34474031916f47677367be6ab4e98517c4811201076ffdc69f.exe
Resource
win10v2004-20221111-en
General
-
Target
289ab98c80d2cb34474031916f47677367be6ab4e98517c4811201076ffdc69f.exe
-
Size
58KB
-
MD5
1a56a4cedaa4d8af0057c31201b9e3f0
-
SHA1
ba7ec0556437d4711a455be2189970000e0592a2
-
SHA256
289ab98c80d2cb34474031916f47677367be6ab4e98517c4811201076ffdc69f
-
SHA512
3d71a30d1ba8c9fa4cf170544a44e86c492e5a9c15a6ed596ab012d2e8c32d4f087702a239d4146ef03fb6cb0f6afb6b9a7337395b694af7d04f91ec2ceb3461
-
SSDEEP
1536:bRrfZCLSAU/UHn6vi7q6qLd+YEKjz2OgKyEh1bdB:bRrf4LSAQ0lqZ+DUh1b
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 288 289ab98c80d2cb34474031916f47677367be6ab4e98517c4811201076ffdc69f.exe 436 svchost.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 288 289ab98c80d2cb34474031916f47677367be6ab4e98517c4811201076ffdc69f.exe 288 289ab98c80d2cb34474031916f47677367be6ab4e98517c4811201076ffdc69f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 436 svchost.exe 436 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\289ab98c80d2cb34474031916f47677367be6ab4e98517c4811201076ffdc69f.exe"C:\Users\Admin\AppData\Local\Temp\289ab98c80d2cb34474031916f47677367be6ab4e98517c4811201076ffdc69f.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:288
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:436