Analysis
-
max time kernel
163s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe
Resource
win10v2004-20220812-en
General
-
Target
91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe
-
Size
204KB
-
MD5
74fa1a8ed44c127211453bba6066e5a0
-
SHA1
a924d66af80d3529cf540e9a9706ad010c0cc34a
-
SHA256
91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b
-
SHA512
f4555b344d5a33d5c87d0404a1cdee1d08433f3421e4d52003977ca08e3e69243d8b10582d11c82a3ded456dae820c3c47216183f53ff1fe5737b0542b7b75ed
-
SSDEEP
3072:iKBQ3Vqm6tRjjUDJB/2P1g2sQIXbEZqB7KqNADMxoUXR0cAxUuUBoA5IeakDa/Tp:ismQU4qJKkAD8oUXycAx+oA5IT
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B8225737-A196-6491-121A-A91B9EFEB24C} 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B8225737-A196-6491-121A-A91B9EFEB24C}\stubpath = "%SystemRoot%\\system32\\V3Medic.exe" 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\V3Medic.exe 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe File created C:\Windows\SysWOW64\V3Medic.exe 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4384 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3000 4384 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe 81 PID 4384 wrote to memory of 3000 4384 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe 81 PID 4384 wrote to memory of 3000 4384 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe 81 PID 4384 wrote to memory of 1212 4384 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe 84 PID 4384 wrote to memory of 1212 4384 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe 84 PID 4384 wrote to memory of 1212 4384 91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe"C:\Users\Admin\AppData\Local\Temp\91719e51e955bc278e95ddf66897acbd49158c416b0efe14250839d54a6f8d6b.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{B8225737-A196-6491-121A-A91B9EFEB24C}" /f2⤵PID:3000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\91719E~1.EXE > nul2⤵PID:1212
-