Analysis
-
max time kernel
175s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe
Resource
win10v2004-20220812-en
General
-
Target
11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe
-
Size
277KB
-
MD5
44baad7e278147f5df875c52b79db49d
-
SHA1
3b8498f19fb2ae813b3ba5eabcc8e1e4f7989e6b
-
SHA256
11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5
-
SHA512
a3225ba90cb77a912e161a2d039228ec6473ac2e81f974516bace55f2c9342650fab81020623efdebf924399a96baf1372404d56bb86be4d93c581c54c8c9001
-
SSDEEP
6144:Szkz8hEyFNa3vWQzXFRel5zWvLMZ6RIxNs4egEn7J9:Swz87FNXIg6IvdE7H
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1124 cmd.exe -
Unexpected DNS network traffic destination 6 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Update = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Desktop\\Install\\{8dceb85e-8508-ee5b-cccc-98a6b145e6ef}\\❤≸⋙\\Ⱒ☠⍨\\\u202eﯹ๛\\{8dceb85e-8508-ee5b-cccc-98a6b145e6ef}\\GoogleUpdate.exe\" >" 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3776 set thread context of 1124 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe 80 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe 2424 Process not Found 2424 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2424 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe Token: SeDebugPrivilege 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe Token: SeDebugPrivilege 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe Token: SeDebugPrivilege 2424 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2424 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3776 wrote to memory of 1124 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe 80 PID 3776 wrote to memory of 1124 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe 80 PID 3776 wrote to memory of 1124 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe 80 PID 3776 wrote to memory of 1124 3776 11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe"C:\Users\Admin\AppData\Local\Temp\11f9f2070b370a178e46f8e06b7314b255b378f58782325a040d9b21c1a2f9a5.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Deletes itself
PID:1124
-