Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe
Resource
win10v2004-20220812-en
General
-
Target
ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe
-
Size
93KB
-
MD5
7a5fb254668e7a83334beb350c251200
-
SHA1
4b5ffe16043c558dd91bb8b022e4ea6fbe113b2c
-
SHA256
ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15
-
SHA512
690a8f59a414dd2abe95a7070f2c6f9415cada5721c3426921475ba5dfd4a2cb45e5834ecf46fc4a9b734e5ffd3d6054983aea2462bd9a8187463aae06a67a67
-
SSDEEP
1536:qO4SEoZ0uQdTc7OqErar+F++++++++++++++++++++8xSbazkPO+SQptzKvAd4:q9boZ0uqiOqErarw+++++++++++++++q
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4d75djt.exe ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4d75djt.exe ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1324 set thread context of 1420 1324 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1420 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1420 1324 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe 27 PID 1324 wrote to memory of 1420 1324 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe 27 PID 1324 wrote to memory of 1420 1324 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe 27 PID 1324 wrote to memory of 1420 1324 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe 27 PID 1324 wrote to memory of 1420 1324 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe 27 PID 1324 wrote to memory of 1420 1324 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe 27 PID 1420 wrote to memory of 1208 1420 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe 15 PID 1420 wrote to memory of 1208 1420 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe 15 PID 1420 wrote to memory of 1208 1420 ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe"C:\Users\Admin\AppData\Local\Temp\ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe"C:\Users\Admin\AppData\Local\Temp\ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1420
-
-