Analysis
-
max time kernel
177s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe
Resource
win10v2004-20220812-en
General
-
Target
b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe
-
Size
72KB
-
MD5
857795db230bb6cf98037bfb7d6ac84e
-
SHA1
c939acb281979f56a8dfa960f33f7f41879c5261
-
SHA256
b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1
-
SHA512
be848f4a65402e765e3b24faa094479c95ec4405e52002bcc3ba8de627fd1c7f463090eb0ba34739079025e171432e32457ff4690b614441061390fc77826c31
-
SSDEEP
1536:nHUHWhVMPNzMh0QpFZyOSAYZRx6ik9ld8rAzt3i6EBXlLOUp:09k0QpFZyOSAYZRx6iDrhLOUp
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\software\microsoft\windows\currentversion\run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Backup = "D:\\Backup.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\software\microsoft\windows\currentversion\run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Updates = "D:\\Updates.exe" reg.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 4244 reg.exe 4336 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2708 b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2708 wrote to memory of 1044 2708 b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe 78 PID 2708 wrote to memory of 1044 2708 b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe 78 PID 2708 wrote to memory of 1044 2708 b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe 78 PID 2708 wrote to memory of 1704 2708 b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe 79 PID 2708 wrote to memory of 1704 2708 b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe 79 PID 2708 wrote to memory of 1704 2708 b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe 79 PID 1044 wrote to memory of 4336 1044 cmd.exe 82 PID 1044 wrote to memory of 4336 1044 cmd.exe 82 PID 1044 wrote to memory of 4336 1044 cmd.exe 82 PID 1704 wrote to memory of 4244 1704 cmd.exe 83 PID 1704 wrote to memory of 4244 1704 cmd.exe 83 PID 1704 wrote to memory of 4244 1704 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe"C:\Users\Admin\AppData\Local\Temp\b6fed03cbca737bc4732639896c545663a0b895ca459e85f3b26895a377f6ef1.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\reg.exereg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\reg.exereg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4244
-
-