Analysis
-
max time kernel
29s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe
Resource
win10v2004-20220812-en
General
-
Target
90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe
-
Size
96KB
-
MD5
3000370fa1effe783decb42d7c3c351b
-
SHA1
9124d10677a3088d034f3af324e59209ca18fb2e
-
SHA256
90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13
-
SHA512
a579045cd145dcc3aa46121230acc1ca9f25843b89ed2540529c0e8e03dd69980fd6a3622ad846405bd427210a6684405e2f841f416d6ebe53556eeff399b25a
-
SSDEEP
768:k4fkA0QzOO0BliUpCPROqSchfIohTVqU/gf7DV9p0OnrykjAU+iciUo1o36K5zMl:k0TOO0BXCPROCw9Pw684BjwAKRCqLO9
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe:*:Enabled:Windows Messenger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 316 set thread context of 976 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 32 -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1480 reg.exe 944 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 316 wrote to memory of 1908 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 27 PID 316 wrote to memory of 1908 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 27 PID 316 wrote to memory of 1908 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 27 PID 316 wrote to memory of 1908 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 27 PID 316 wrote to memory of 1896 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 29 PID 316 wrote to memory of 1896 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 29 PID 316 wrote to memory of 1896 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 29 PID 316 wrote to memory of 1896 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 29 PID 1908 wrote to memory of 1480 1908 cmd.exe 31 PID 1908 wrote to memory of 1480 1908 cmd.exe 31 PID 1908 wrote to memory of 1480 1908 cmd.exe 31 PID 1908 wrote to memory of 1480 1908 cmd.exe 31 PID 316 wrote to memory of 976 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 32 PID 316 wrote to memory of 976 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 32 PID 316 wrote to memory of 976 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 32 PID 316 wrote to memory of 976 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 32 PID 316 wrote to memory of 976 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 32 PID 316 wrote to memory of 976 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 32 PID 316 wrote to memory of 976 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 32 PID 316 wrote to memory of 976 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 32 PID 316 wrote to memory of 976 316 90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe 32 PID 1896 wrote to memory of 944 1896 cmd.exe 33 PID 1896 wrote to memory of 944 1896 cmd.exe 33 PID 1896 wrote to memory of 944 1896 cmd.exe 33 PID 1896 wrote to memory of 944 1896 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe"C:\Users\Admin\AppData\Local\Temp\90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- Modifies registry key
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe" /t 1 /d "C:\Users\Admin\AppData\Local\Temp\90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe:*:Enabled:Windows Messenger" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe" /t 1 /d "C:\Users\Admin\AppData\Local\Temp\90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe:*:Enabled:Windows Messenger" /f3⤵
- Modifies firewall policy service
- Modifies registry key
PID:944
-
-
-
C:\Users\Admin\AppData\Local\Temp\90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exeC:\Users\Admin\AppData\Local\Temp\90a2bad09346e481b9bb47430c29fa22c8ff6629dabda8bea006637e208f5a13.exe2⤵PID:976
-