Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe
Resource
win10v2004-20220812-en
General
-
Target
bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe
-
Size
72KB
-
MD5
b855b095aa1edf3aaefa8b55baf1bc9c
-
SHA1
f26601bdd35aa594a31b420debd17ae0ca4e5e1b
-
SHA256
bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7
-
SHA512
08eb26ba76c4f27c8207ff75f9965620a13ffee8d683008a85c24ee3964bfb3159ac1802278f8c1860f8845d9089849208ded7cc2b99121aa4d9101e55543875
-
SSDEEP
1536:SKEaj1KKwKcWkfGrRmKnnTxAxJeMDNlyLq3yGL1ou:eKcWkfGrRmKnnTxCJeGNipu
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe:*:Enabled:Ci Servs" bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe -
Executes dropped EXE 2 IoCs
pid Process 1784 Sontiwin.exe 1592 Sontiwin.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2984 netsh.exe -
resource yara_rule behavioral2/memory/4920-135-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4920-137-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4920-138-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4920-139-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4920-146-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1592-153-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1592-154-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ci Servs = "Sontiwin.exe" bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4800 set thread context of 4920 4800 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 80 PID 1784 set thread context of 1592 1784 Sontiwin.exe 83 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Sontiwin.exe bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe File created C:\Windows\Sontiwin.exe bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4800 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 1784 Sontiwin.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4800 wrote to memory of 4920 4800 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 80 PID 4800 wrote to memory of 4920 4800 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 80 PID 4800 wrote to memory of 4920 4800 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 80 PID 4800 wrote to memory of 4920 4800 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 80 PID 4800 wrote to memory of 4920 4800 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 80 PID 4800 wrote to memory of 4920 4800 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 80 PID 4800 wrote to memory of 4920 4800 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 80 PID 4800 wrote to memory of 4920 4800 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 80 PID 4920 wrote to memory of 2984 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 81 PID 4920 wrote to memory of 2984 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 81 PID 4920 wrote to memory of 2984 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 81 PID 4920 wrote to memory of 1784 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 82 PID 4920 wrote to memory of 1784 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 82 PID 4920 wrote to memory of 1784 4920 bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe 82 PID 1784 wrote to memory of 1592 1784 Sontiwin.exe 83 PID 1784 wrote to memory of 1592 1784 Sontiwin.exe 83 PID 1784 wrote to memory of 1592 1784 Sontiwin.exe 83 PID 1784 wrote to memory of 1592 1784 Sontiwin.exe 83 PID 1784 wrote to memory of 1592 1784 Sontiwin.exe 83 PID 1784 wrote to memory of 1592 1784 Sontiwin.exe 83 PID 1784 wrote to memory of 1592 1784 Sontiwin.exe 83 PID 1784 wrote to memory of 1592 1784 Sontiwin.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe"C:\Users\Admin\AppData\Local\Temp\bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exeC:\Users\Admin\AppData\Local\Temp\bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7.exe2⤵
- Modifies firewall policy service
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram Sontiwin.exe 1 ENABLE3⤵
- Modifies Windows Firewall
PID:2984
-
-
C:\Windows\Sontiwin.exe"C:\Windows\Sontiwin.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\Sontiwin.exeC:\Windows\Sontiwin.exe4⤵
- Executes dropped EXE
PID:1592
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5b855b095aa1edf3aaefa8b55baf1bc9c
SHA1f26601bdd35aa594a31b420debd17ae0ca4e5e1b
SHA256bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7
SHA51208eb26ba76c4f27c8207ff75f9965620a13ffee8d683008a85c24ee3964bfb3159ac1802278f8c1860f8845d9089849208ded7cc2b99121aa4d9101e55543875
-
Filesize
72KB
MD5b855b095aa1edf3aaefa8b55baf1bc9c
SHA1f26601bdd35aa594a31b420debd17ae0ca4e5e1b
SHA256bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7
SHA51208eb26ba76c4f27c8207ff75f9965620a13ffee8d683008a85c24ee3964bfb3159ac1802278f8c1860f8845d9089849208ded7cc2b99121aa4d9101e55543875
-
Filesize
72KB
MD5b855b095aa1edf3aaefa8b55baf1bc9c
SHA1f26601bdd35aa594a31b420debd17ae0ca4e5e1b
SHA256bf9071796d9e13c6cf53e34c59a8c1aefc45984d5506d033285d4b412c860cc7
SHA51208eb26ba76c4f27c8207ff75f9965620a13ffee8d683008a85c24ee3964bfb3159ac1802278f8c1860f8845d9089849208ded7cc2b99121aa4d9101e55543875