Analysis
-
max time kernel
182s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 12:14
Behavioral task
behavioral1
Sample
e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe
Resource
win10v2004-20221111-en
General
-
Target
e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe
-
Size
192KB
-
MD5
75973617b1f2d899b5c2323b698352a2
-
SHA1
5d09157e6d5ba609a40e97eef16b978addadc30f
-
SHA256
e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e
-
SHA512
30b570943dc7b7f1e003ac6d88fd7dd501366741ca7fe65105554cacf2bf60cf6549cef019b90ab35f917b530114c247ef175159ccfb48b22f44b80dc14b23e1
-
SSDEEP
3072:F1nEfWKd2Ss2thzsVtEs4n430hzvV1zb3QzzEeBJWL1HzPbykZKiwU/Wnt:wfVUv2th4sP4ETV1zbAf5bS1HbGkZ0Uu
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3484-132-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/3484-141-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/files/0x00060000000231a2-145.dat upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3484 set thread context of 3848 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 83 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1656 reg.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3484 wrote to memory of 3848 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 83 PID 3484 wrote to memory of 3848 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 83 PID 3484 wrote to memory of 3848 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 83 PID 3484 wrote to memory of 3848 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 83 PID 3484 wrote to memory of 3848 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 83 PID 3484 wrote to memory of 3848 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 83 PID 3484 wrote to memory of 3848 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 83 PID 3848 wrote to memory of 1664 3848 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 84 PID 3848 wrote to memory of 1664 3848 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 84 PID 3848 wrote to memory of 1664 3848 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 84 PID 3484 wrote to memory of 700 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 86 PID 3484 wrote to memory of 700 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 86 PID 3484 wrote to memory of 700 3484 e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe 86 PID 1664 wrote to memory of 1656 1664 cmd.exe 88 PID 1664 wrote to memory of 1656 1664 cmd.exe 88 PID 1664 wrote to memory of 1656 1664 cmd.exe 88 PID 1664 wrote to memory of 644 1664 cmd.exe 89 PID 1664 wrote to memory of 644 1664 cmd.exe 89 PID 1664 wrote to memory of 644 1664 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe"C:\Users\Admin\AppData\Local\Temp\e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe"C:\Users\Admin\AppData\Local\Temp\e7c075e23a0bedfc8d86b5d55c5378862f33f7c6a0d33973986d60550731f02e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Start.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations /v ModRiskFileTypes /t REG_SZ /d .exe /f4⤵
- Modifies registry key
PID:1656
-
-
C:\Windows\SysWOW64\gpupdate.exegpupdate /force4⤵PID:644
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\jnduf.bat2⤵PID:700
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD59cedeb0b293d2b5491225ef3d9eb2a8b
SHA1b607ef9bd319b6ec696c8dab8a314998d133298b
SHA2563fc59706783a0778da9121da52a63e34e47c82f436d5b14943e14fb418fd4f08
SHA512ec7d4544e32b1ea460895b1037a9eca2529eed45d6ee1644f83dfc4d4ad8f7c32a811ee4627bc6b243fb5d5c9e3e2b22060d6a2903692830ff1f114d2b9f3cfc
-
Filesize
341B
MD5143fe63638ffe62b1fc3ef4789f288bd
SHA19e211315cde783d3d9f63608aaf58c67e5f4814d
SHA2561bdec6a12e4e6f6a4fc5b4309980501a425fe4ff38843f3d998418778fc86e9c
SHA512ac86d8722b98a9167541ad3f687432138ade93346d269bb17790149ac158a1ca2ed78f3ed5ebc4bf96363fd34f407609ea69dd4430ff433f5ae285ea1ad2c57d
-
Filesize
192KB
MD5b1fd481460eca2c86c05ae8e0dac92af
SHA14bd39781cc831fdd67ef17a45e0d09b9359d7b5c
SHA25632bed827712839190f21be708ada970ca0807323930622a87a3bd62b8e994c0f
SHA5121a493ebddaebbce3de3df0a3e0015ccbb2dd50c20e0e61b16fbab6a514d17c6058baa9797cab008c49285f461c2e28a58a25c94ccaddef311cceeaa2a5795592