Analysis
-
max time kernel
146s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
TIBIAC~1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TIBIAC~1.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
serwer.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
serwer.exe
Resource
win10v2004-20221111-en
General
-
Target
serwer.exe
-
Size
531KB
-
MD5
241f126a482976bb08e2ba5e2659b920
-
SHA1
307fda84fcd6efb8ea825f9abf5eb2be332d0ae8
-
SHA256
7443f9c791a878d45fda1d1588a58a70269e651cc21ba1f3743d1ed28d961b0a
-
SHA512
3f06b5c3011f5822c11cca2ededd4eea79fe6a826604550513fee9b9d6b64fa9ffb0cdb6b4cbd0705fea6ba32ad38868daba306b61889225232f790858b416cc
-
SSDEEP
12288:VA89XSbbKSCxtm6IirAVbWqlTrTO4yubwFXHrGx:VN9a6tm6troWqBrbEbi
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ serwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Windows\\winlogon.exe" serwer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\plik.exe serwer.exe File opened for modification C:\Windows\plik.exe serwer.exe File created C:\Windows\winlogon.exe serwer.exe File opened for modification C:\Windows\winlog.txt serwer.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 880 serwer.exe 880 serwer.exe 880 serwer.exe 880 serwer.exe 880 serwer.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 880 serwer.exe 880 serwer.exe 880 serwer.exe 880 serwer.exe 880 serwer.exe