Analysis
-
max time kernel
180s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 12:05
Static task
static1
Behavioral task
behavioral1
Sample
ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe
Resource
win10v2004-20220812-en
General
-
Target
ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe
-
Size
155KB
-
MD5
f3d7a2bf6243d92a9e9517c05b0cb752
-
SHA1
fb054b180b224649d6d9f01446b99762a03e05d3
-
SHA256
ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195
-
SHA512
331163ed70633be5c64426f2f22ff7c07c19e0547cc7ae24fd424c9d64f06a61ac24c85179883158c1a17c8360c382c2b06ad37e93ee9dabb1ac9de5576035fa
-
SSDEEP
3072:Rzr1NrFclCMF8BNCA6GVafIrjhfPre8wwALf536:RNJ+lCMFysAUKaR3
Malware Config
Signatures
-
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.165.17.4 Destination IP 194.165.17.4 Destination IP 194.165.17.4 Destination IP 194.165.17.4 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2984 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe Token: SeDebugPrivilege 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe Token: SeDebugPrivilege 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2984 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4724 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe 79 PID 3544 wrote to memory of 4724 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe 79 PID 3544 wrote to memory of 4724 3544 ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe"C:\Users\Admin\AppData\Local\Temp\ef978a64f5029f88345b8e623ea8b5a7ad9e2035e47c09c86f7a58e7f89d4195.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:4724
-