Analysis
-
max time kernel
356s -
max time network
436s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 11:50
Behavioral task
behavioral1
Sample
fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe
Resource
win7-20220812-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe
Resource
win10v2004-20221111-en
6 signatures
150 seconds
General
-
Target
fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe
-
Size
677KB
-
MD5
f4120c461f71658406be60528052145d
-
SHA1
1345cabf345f032a6f50ac8a4187d7e32ba9b8e7
-
SHA256
fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50
-
SHA512
8b5e46ce0d2b55ff42601c3a10768e5acb6bdc5517b8ebc45137f76c2ed71c45de699d184bc3a2f1c05fbba615c12a061cee5c614911ba8a5b82b9b8eb8d859d
-
SSDEEP
6144:/KR+wDIN4oyU9j1izdoyJwUzlDoncnioDlbDohboS:/K4wU4yjwJCjoD4boS
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\ProgramData\\22CC6C32.exe" fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\22CC6C32.exe" fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe -
resource yara_rule behavioral2/memory/2412-132-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral2/memory/2412-135-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral2/memory/4252-137-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2412-139-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral2/memory/4252-140-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4252-141-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4252-142-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2412 set thread context of 4252 2412 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 82 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 4252 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2412 wrote to memory of 4252 2412 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 82 PID 2412 wrote to memory of 4252 2412 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 82 PID 2412 wrote to memory of 4252 2412 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 82 PID 2412 wrote to memory of 4252 2412 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 82 PID 2412 wrote to memory of 4252 2412 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 82 PID 2412 wrote to memory of 4252 2412 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 82 PID 2412 wrote to memory of 4252 2412 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 82 PID 2412 wrote to memory of 4252 2412 fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe"C:\Users\Admin\AppData\Local\Temp\fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exeC:\Users\Admin\AppData\Local\Temp\fb90dace2b95ceec430dae9adc3b0ac96ef6347db3446f9ba9ac21c930047e50.exe2⤵
- Modifies WinLogon for persistence
- Suspicious behavior: EnumeratesProcesses
PID:4252
-