Analysis
-
max time kernel
188s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe
Resource
win10v2004-20221111-en
General
-
Target
a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe
-
Size
180KB
-
MD5
f4b104afd42a910ca2ae2b6a573f69ee
-
SHA1
1ba774cd9a50ac41b7d21eb37a910a15efa035ea
-
SHA256
a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3
-
SHA512
e71bc432e2dd4b4de79b971b4fe6af3f05dc16c7c7c594fac8b31c656ab780136495bedc405117623f3e40ce0327d5cccae12a28016e4ad2c9a7eca072b687bb
-
SSDEEP
3072:sqGpfKTFN5/E/9L8jYmWaz1huMXj28iJ844YiFxEgiqdpT6qdvseGrzS3VztV5zp:sbfKThclQs/apkMT28ZVtdpdseDFx6L8
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{df4757a3-8c4e-42bd-395c-84c59df2e649}\\n." a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe -
Unexpected DNS network traffic destination 8 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 66.85.130.234 Destination IP 91.193.74.13 Destination IP 66.85.130.234 Destination IP 91.193.74.13 Destination IP 91.193.74.13 Destination IP 91.193.74.13 Destination IP 66.85.130.234 Destination IP 66.85.130.234 -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\clsid a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1} a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{df4757a3-8c4e-42bd-395c-84c59df2e649}\\n." a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1192 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe Token: SeDebugPrivilege 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe Token: SeDebugPrivilege 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1192 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe 48 PID 1720 wrote to memory of 1192 1720 a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe 48
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe"C:\Users\Admin\AppData\Local\Temp\a743f22dfc0677a7e772e9aea1614319fd6d0909ecbc259ba95068d731484df3.exe"2⤵
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720
-