Analysis
-
max time kernel
329s -
max time network
378s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 22:55
Behavioral task
behavioral1
Sample
f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe
Resource
win7-20221111-en
General
-
Target
f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe
-
Size
822KB
-
MD5
40c5d3ada515e0a592cc6f4969fc1854
-
SHA1
e20e712480dff42e01cbc4482387a84edf62deb0
-
SHA256
f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097
-
SHA512
cd42d8fede2f79513e172e8c166c28cf5b48a7c5c4ade8a7e69b763d4bce6dc6e6629ff68a09a210130cc12a4819d1bee2af8e437c391456cd8932cec8165488
-
SSDEEP
12288:cMZSamKJgQeLuuPPkpuJy9oy71+dzjjkImJE3pY8WjNH2xZKABcyawffel:cMZ9lJg1L93Jy96jAspYrRWxRc+f
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2280-132-0x0000000000400000-0x000000000062E000-memory.dmp upx behavioral2/memory/2280-133-0x0000000000400000-0x000000000062E000-memory.dmp upx behavioral2/memory/2280-135-0x0000000000400000-0x000000000062E000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2280 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 2280 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 2280 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 2280 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2280 wrote to memory of 5060 2280 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 79 PID 2280 wrote to memory of 5060 2280 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 79 PID 2280 wrote to memory of 5060 2280 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 79 PID 5060 wrote to memory of 1780 5060 cmd.exe 81 PID 5060 wrote to memory of 1780 5060 cmd.exe 81 PID 5060 wrote to memory of 1780 5060 cmd.exe 81 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1780 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe"C:\Users\Admin\AppData\Local\Temp\f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\clri$nsx.bat2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\attrib.exeattrib -H -R "C:\Users\Admin\AppData\Local\Temp\clri$nsx.bat"3⤵
- Views/modifies file attributes
PID:1780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361B
MD5d2c0aedbfed2065d94fc6892974f58ea
SHA1c18268764e1dbe29819eb2adc30a55a686a67f8f
SHA256b91606e6b5965351199069e1f9891b87ce6cff570f606a1c1d54fbe6de5c2f11
SHA5120b99e807cd37ffea6c22c952b1ade0574b1e0e49563f7f1cfbc18af597a4031beb264cbb2e488953a441deaaa8efb0758d9175bf19f5c0ad40f619a64d0506c6