Analysis
-
max time kernel
174s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 10:29
Static task
static1
Behavioral task
behavioral1
Sample
a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe
-
Size
94KB
-
MD5
bc245df2f886b439ede0832e4781b5e0
-
SHA1
51780a2cd86d01e9cac80a8db9af558dc33ce6cd
-
SHA256
a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa
-
SHA512
d5659aa08443c34761353b789cc2cf9be322190ae4d990dfb69e45c1df379b4730cc3b781962037f64813cc7bc1a7f546bb483e1990598f83f6694008e4b5b4a
-
SSDEEP
1536:eMRQwwV6McsochNvxl6XI/xpoUCisKldV:XeV6TswXI/xpoUfR
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Windows\SysWOW64\runouce.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\7-Zip\7zG.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\7-Zip\7z.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1724 1636 a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe 28 PID 1636 wrote to memory of 1724 1636 a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe 28 PID 1636 wrote to memory of 1724 1636 a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe 28 PID 1636 wrote to memory of 1724 1636 a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe 28 PID 1636 wrote to memory of 1244 1636 a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe 14 PID 1636 wrote to memory of 1244 1636 a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe"C:\Users\Admin\AppData\Local\Temp\a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe"C:\Users\Admin\AppData\Local\Temp\a5c3cb27abad586633dbe2ed838b429b14204c53df99a22456556285f38e74aa.exe"3⤵PID:1724
-
-