Analysis
-
max time kernel
150s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe
Resource
win10v2004-20221111-en
General
-
Target
bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe
-
Size
351KB
-
MD5
37f5f56f232203bb60b0036b94c3dc85
-
SHA1
39ec98058f108aa884d76b718e800091a2e9438c
-
SHA256
bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9
-
SHA512
8e9a19e02cd25cec1a4eebb30840fea09f49602bd6fa8cf3e2711dbf64736da43e341ae07cc2367892eac9b5e2e12a77f7ae95a7346c18c6910035fafe56e7ca
-
SSDEEP
6144:Z3c4cg0RO2MTBtGIPaK8KKNYC5RaAcF3FPj5DoXF93pqrQ:ZiBTM98yaKWYCqA6FPj5EXT4Q
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 824 lBkDyW175o.exe 1824 lBkDyW175o.exe -
Deletes itself 1 IoCs
pid Process 1824 lBkDyW175o.exe -
Loads dropped DLL 4 IoCs
pid Process 1692 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 1692 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 1692 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 1824 lBkDyW175o.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nMa7gnewLbOWkI = "C:\\ProgramData\\PtwU4DW7t2Q7H9Py\\lBkDyW175o.exe" bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1464 set thread context of 1692 1464 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 26 PID 824 set thread context of 1824 824 lBkDyW175o.exe 28 PID 1824 set thread context of 864 1824 lBkDyW175o.exe 29 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1692 1464 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 26 PID 1464 wrote to memory of 1692 1464 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 26 PID 1464 wrote to memory of 1692 1464 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 26 PID 1464 wrote to memory of 1692 1464 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 26 PID 1464 wrote to memory of 1692 1464 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 26 PID 1464 wrote to memory of 1692 1464 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 26 PID 1692 wrote to memory of 824 1692 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 27 PID 1692 wrote to memory of 824 1692 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 27 PID 1692 wrote to memory of 824 1692 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 27 PID 1692 wrote to memory of 824 1692 bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe 27 PID 824 wrote to memory of 1824 824 lBkDyW175o.exe 28 PID 824 wrote to memory of 1824 824 lBkDyW175o.exe 28 PID 824 wrote to memory of 1824 824 lBkDyW175o.exe 28 PID 824 wrote to memory of 1824 824 lBkDyW175o.exe 28 PID 824 wrote to memory of 1824 824 lBkDyW175o.exe 28 PID 824 wrote to memory of 1824 824 lBkDyW175o.exe 28 PID 1824 wrote to memory of 864 1824 lBkDyW175o.exe 29 PID 1824 wrote to memory of 864 1824 lBkDyW175o.exe 29 PID 1824 wrote to memory of 864 1824 lBkDyW175o.exe 29 PID 1824 wrote to memory of 864 1824 lBkDyW175o.exe 29 PID 1824 wrote to memory of 864 1824 lBkDyW175o.exe 29 PID 1824 wrote to memory of 864 1824 lBkDyW175o.exe 29 PID 1824 wrote to memory of 864 1824 lBkDyW175o.exe 29 PID 1824 wrote to memory of 864 1824 lBkDyW175o.exe 29 PID 1824 wrote to memory of 864 1824 lBkDyW175o.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe"C:\Users\Admin\AppData\Local\Temp\bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe"C:\Users\Admin\AppData\Local\Temp\bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe"C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe"C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe"C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe" /i:18245⤵PID:864
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351KB
MD5fac8210e33fc49e93af00aad0833c6d6
SHA1fa89c869149d43775d5a4f450cd147de1c6da3ac
SHA2566f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531
SHA5128f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6
-
Filesize
351KB
MD5fac8210e33fc49e93af00aad0833c6d6
SHA1fa89c869149d43775d5a4f450cd147de1c6da3ac
SHA2566f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531
SHA5128f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6
-
Filesize
351KB
MD5fac8210e33fc49e93af00aad0833c6d6
SHA1fa89c869149d43775d5a4f450cd147de1c6da3ac
SHA2566f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531
SHA5128f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6
-
Filesize
351KB
MD5fac8210e33fc49e93af00aad0833c6d6
SHA1fa89c869149d43775d5a4f450cd147de1c6da3ac
SHA2566f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531
SHA5128f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6
-
Filesize
351KB
MD5fac8210e33fc49e93af00aad0833c6d6
SHA1fa89c869149d43775d5a4f450cd147de1c6da3ac
SHA2566f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531
SHA5128f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6
-
Filesize
351KB
MD537f5f56f232203bb60b0036b94c3dc85
SHA139ec98058f108aa884d76b718e800091a2e9438c
SHA256bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9
SHA5128e9a19e02cd25cec1a4eebb30840fea09f49602bd6fa8cf3e2711dbf64736da43e341ae07cc2367892eac9b5e2e12a77f7ae95a7346c18c6910035fafe56e7ca
-
Filesize
351KB
MD5fac8210e33fc49e93af00aad0833c6d6
SHA1fa89c869149d43775d5a4f450cd147de1c6da3ac
SHA2566f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531
SHA5128f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6