Analysis
-
max time kernel
156s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe
Resource
win10v2004-20221111-en
General
-
Target
6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe
-
Size
206KB
-
MD5
feb657c11afd007507fba327d05ecfca
-
SHA1
e73a3707fa4b83254fdafbbdb8f8bdd619afc0c6
-
SHA256
6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928
-
SHA512
63b944c6a295d5f4abf96f1286af9305dc598cd86f01e24905719e5b0574ce7d21c32e160b2cf2fcfdc526ba0281e8fab5480009135bfec10f11200192724bc3
-
SSDEEP
3072:ke/S8NtgzZVNK04mCmBKIQKcqcxQsyQ321Agq4i6b+Zlp:kIy97CmBKIQDqcxQrQmjJit
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C2BEB593-1761-B300-095C-6575CF1AD088} 6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C2BEB593-1761-B300-095C-6575CF1AD088}\stubpath = "C:\\Program Files\\Common Files\\Apple\\Mobile Device Support\\apple.exe" 6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Apple\Mobile Device Support\apple.exe 6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe File created C:\Program Files\Common Files\Apple\Mobile Device Support\apple.exe 6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1708 wrote to memory of 3380 1708 6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe 83 PID 1708 wrote to memory of 3380 1708 6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe 83 PID 1708 wrote to memory of 3380 1708 6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe"C:\Users\Admin\AppData\Local\Temp\6dc937ba740d5396314f8d65a7090ab74a57db9db241c06b037434a716d5d928.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{C2BEB593-1761-B300-095C-6575CF1AD088}" /f2⤵PID:3380
-