Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 02:11
Static task
static1
Behavioral task
behavioral1
Sample
4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe
Resource
win10v2004-20220901-en
General
-
Target
4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe
-
Size
354KB
-
MD5
1b2b7f299853098f0fa18acf1b9dbe60
-
SHA1
48b45a3b8ab6aac1975faf85663c7b139c3b1e77
-
SHA256
4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6
-
SHA512
8705bf183a4c60e107274a6a67c98426192d89626b704ceadf6d4825fa3f491d866550896bf63e55d467fb08bda51b20895e5728e77a03831b63a4a772411b62
-
SSDEEP
6144:ajX2zgeMsgb3cNqw8sn+TSWdr3QCGuKNcRx3cqEPmNKAvdaCRdko:Rgb3cNF8cVWFzLHEPZAvFdk
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe File opened for modification C:\Windows\SysWOW64\runouce.exe 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2016 2024 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe 27 PID 2024 wrote to memory of 2016 2024 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe 27 PID 2024 wrote to memory of 2016 2024 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe 27 PID 2024 wrote to memory of 2016 2024 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe 27 PID 2024 wrote to memory of 2016 2024 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe 27 PID 2024 wrote to memory of 2016 2024 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe 27 PID 2024 wrote to memory of 2016 2024 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe 27 PID 2024 wrote to memory of 1400 2024 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe 20 PID 2024 wrote to memory of 1400 2024 4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe"C:\Users\Admin\AppData\Local\Temp\4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe"C:\Users\Admin\AppData\Local\Temp\4ce051d930113a6d94eb5377d83d8e2c2b228cf127dc93fd013e63461a9f2ef6.exe"3⤵PID:2016
-
-