Analysis
-
max time kernel
226s -
max time network
309s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe
Resource
win10v2004-20221111-en
General
-
Target
1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe
-
Size
57KB
-
MD5
35e31932ceaac4665ae78504c51bc193
-
SHA1
58ff7642da3251bfaecdd21b590a3a727481a314
-
SHA256
1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770
-
SHA512
1cb3eda27a34a49f7af8f6fedd8aaf42a5483b61ded9901d87c2137b47db6aff2cc2493e4bc5b910612f9ce6b18ddd5e7a39d49fc6dc764421f726143dc412d3
-
SSDEEP
768:G+w2ABUMRfepD7H3az61T818/gy0ScBJX5vXQkdAlaf57vvJYlpUxbaSz:GuZj3aSV/rcPlBdAa7vqlpUxba
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\skype.dat" svchost.exe -
resource yara_rule behavioral1/memory/1120-56-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/1120-58-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/1120-59-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/1120-63-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/1120-64-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/1120-65-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/1120-66-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/1120-67-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1120 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 704 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 872 set thread context of 1120 872 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 28 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe 704 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1120 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 1120 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 924 ctfmon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 704 svchost.exe 704 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 872 wrote to memory of 1120 872 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 28 PID 872 wrote to memory of 1120 872 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 28 PID 872 wrote to memory of 1120 872 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 28 PID 872 wrote to memory of 1120 872 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 28 PID 872 wrote to memory of 1120 872 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 28 PID 872 wrote to memory of 1120 872 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 28 PID 872 wrote to memory of 1120 872 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 28 PID 872 wrote to memory of 1120 872 1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe 28 PID 704 wrote to memory of 924 704 svchost.exe 30 PID 704 wrote to memory of 924 704 svchost.exe 30 PID 704 wrote to memory of 924 704 svchost.exe 30 PID 704 wrote to memory of 924 704 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe"C:\Users\Admin\AppData\Local\Temp\1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe"C:\Users\Admin\AppData\Local\Temp\1546b36e987b73fc65accc5b0c1c885224bd4a6d97f2d0a7ae41e079dfe9b770.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:1120
-
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:924
-