Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe
Resource
win10v2004-20220812-en
General
-
Target
ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe
-
Size
88KB
-
MD5
a7a924f6e922219fd3d0bfaa7d3f78ef
-
SHA1
2b5513e45fe587524ea0400e07b01e7bb4646019
-
SHA256
ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f
-
SHA512
c1ba78943f083fa741fcd734f95aeb6064c92aa4f3f6184bfb43cb3a3f90beb60628b660dc2797fdae9517d5747c9a36e4d5a049f19520f5912fc9178552eb8b
-
SSDEEP
1536:E3P+/g9qdOfzluKtzOnOgpUbExiUlGQfGUG1o:sNqdOZzOjpUoYUlGtUSo
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\userinit.exe ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe File opened for modification C:\Windows\SysWOW64\ntxeed.dll ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe File opened for modification C:\Windows\SysWOW64\amurpm.dll ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 360 set thread context of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27 PID 360 wrote to memory of 1712 360 ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe"C:\Users\Admin\AppData\Local\Temp\ac22a550a51f40287100505150214e87160a8564bf307a80879c6ba00fb65e8f.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe2⤵PID:1712
-