Analysis
-
max time kernel
152s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 03:09
Static task
static1
Behavioral task
behavioral1
Sample
ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe
Resource
win10v2004-20220812-en
General
-
Target
ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe
-
Size
58KB
-
MD5
1706bc9b94a4eedd040d24e07909a3f0
-
SHA1
97735129e341c8bc23f1e0e2c436b1053811b7d5
-
SHA256
ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f
-
SHA512
3214bbbb299eeae25b502f9cd1e326ab0dd9733da9ac65febe4a44c4480e33bc465553013086d51ae6a409f485abe787be25cbe2f38c6cde8510e5e0fe3cea46
-
SSDEEP
1536:pM4WXwX8Cfst3awkwFMerjcTtUm2fA9VpSuC6ARUx90w2:pM588CrweefcBJ2IdSuC690w
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1760 ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe 604 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1760 ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe 1760 ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 604 svchost.exe 604 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 604 wrote to memory of 1872 604 svchost.exe 29 PID 604 wrote to memory of 1872 604 svchost.exe 29 PID 604 wrote to memory of 1872 604 svchost.exe 29 PID 604 wrote to memory of 1872 604 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe"C:\Users\Admin\AppData\Local\Temp\ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:1760
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:1872
-