Analysis
-
max time kernel
151s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe
Resource
win10v2004-20221111-en
General
-
Target
a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe
-
Size
47KB
-
MD5
7837907146cf0ffcbc2105495cc75725
-
SHA1
07e1f93ce278dbe249cbbad32ac521230d7b7b65
-
SHA256
a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e
-
SHA512
e75b1ace71ee56ee18c8cf1876085a0527e082f4b7b78d090f227c5a93131f0565f048d17951f4517305d34a230359fa9bf76ab624bea3a227c8916d09ccfe89
-
SSDEEP
768:drmCr59wnjVPdLlyqG2uCsaLJbC23isKl4qp:daCr58JtJu5alC23isKldp
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Windows\SysWOW64\runouce.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\7-Zip\7z.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\7-Zip\7zG.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1900 msiexec.exe Token: SeIncreaseQuotaPrivilege 1900 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1900 msiexec.exe 1900 msiexec.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1520 1796 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 28 PID 1796 wrote to memory of 1520 1796 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 28 PID 1796 wrote to memory of 1520 1796 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 28 PID 1796 wrote to memory of 1520 1796 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 28 PID 1796 wrote to memory of 1520 1796 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 28 PID 1796 wrote to memory of 1520 1796 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 28 PID 1796 wrote to memory of 1520 1796 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 28 PID 1520 wrote to memory of 1900 1520 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 29 PID 1520 wrote to memory of 1900 1520 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 29 PID 1520 wrote to memory of 1900 1520 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 29 PID 1520 wrote to memory of 1900 1520 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 29 PID 1520 wrote to memory of 1900 1520 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 29 PID 1520 wrote to memory of 1900 1520 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 29 PID 1520 wrote to memory of 1900 1520 a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe"C:\Users\Admin\AppData\Local\Temp\a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe"C:\Users\Admin\AppData\Local\Temp\a957e343db8e42fec720977be8a0b7d5f046b9f4edde218768bd6e3963852d3e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\msiexec.exemsiexec /i "Kaspersky Network Agent.msi" REINSTALL="ALL" REINSTALLMODE="voums" /l*v "C:\Users\Admin\AppData\Local\Temp\kl-install-2022-12-06-10-52-53.log"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1900
-
-