Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe
Resource
win10v2004-20221111-en
General
-
Target
40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe
-
Size
60KB
-
MD5
179807a3f1b163e0fb81dac1af1f18d0
-
SHA1
540ca9f741ece2a1b8273ced1c3a7ea97c0b5ece
-
SHA256
40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40
-
SHA512
be0e73a81e6d3f59fcc2a809b76bcb6776610fc0522e73cb3860f1f647f4c888a85c6101477f5aaebb289fb72f471fdf2386eadb973c7b778e8c78fd6f6b9cde
-
SSDEEP
768:x+yvC2D/1AqexeNFkgS6L9MAdxF9jjuS+YoWiYDVEmeU5deP2LG0eQ8Ekvit4Ps1:x+y/2qexikX2whN/L9Q8EztIs1f
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1288 set thread context of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 616 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 616 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1288 wrote to memory of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27 PID 1288 wrote to memory of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27 PID 1288 wrote to memory of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27 PID 1288 wrote to memory of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27 PID 1288 wrote to memory of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27 PID 1288 wrote to memory of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27 PID 1288 wrote to memory of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27 PID 1288 wrote to memory of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27 PID 1288 wrote to memory of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27 PID 1288 wrote to memory of 616 1288 40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe"C:\Users\Admin\AppData\Local\Temp\40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\40f5152b950b5aa052fcfc268b1cbfc6a42d0241683b4225cfd3ff466ed18c40.exee|2⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:616
-