Analysis
-
max time kernel
212s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe
Resource
win10v2004-20221111-en
General
-
Target
e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe
-
Size
129KB
-
MD5
077d1dd4556d145108d75b08b9c5b6c4
-
SHA1
a7d57b234b518e44836d80bf96e424f6776dbb3c
-
SHA256
e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb
-
SHA512
7cbff5548898757f1fff506e00b8c0794ff42e10a3f78774d97f5be41b794f8f8912b2ff48cc83aadbb11e03c66ad12d39dab1eceded9b5d1df36bc7fe901272
-
SSDEEP
3072:+R0h/lwCrnR3HWtId+VO91I2X3ymXJ+eoYxGA/jH:i0saR3HfQVuqbmXJ+FMGAb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4160 cmd.exe -
Unexpected DNS network traffic destination 6 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.165.17.4 Destination IP 194.165.17.4 Destination IP 194.165.17.4 Destination IP 194.165.17.4 Destination IP 194.165.17.4 Destination IP 194.165.17.4 -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Update = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Desktop\\Install\\{df4757a3-8c4e-42bd-395c-84c59df2e649}\\❤≸⋙\\Ⱒ☠⍨\\\u202eﯹ๛\\{df4757a3-8c4e-42bd-395c-84c59df2e649}\\GoogleUpdate.exe\" >" e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 748 set thread context of 4160 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe 82 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2528 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe Token: SeDebugPrivilege 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe Token: SeDebugPrivilege 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2528 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 748 wrote to memory of 4160 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe 82 PID 748 wrote to memory of 4160 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe 82 PID 748 wrote to memory of 4160 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe 82 PID 748 wrote to memory of 4160 748 e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe"C:\Users\Admin\AppData\Local\Temp\e0aef12b5add650469602f565833f554a380ede2f1ca0e0d1f21e35d1c4384fb.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Deletes itself
PID:4160
-