Analysis
-
max time kernel
188s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe
Resource
win10v2004-20221111-en
General
-
Target
bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe
-
Size
82KB
-
MD5
40cd07cb2aa4f0cac808618b20e4d0ed
-
SHA1
062514111f78e91787c0f2e88c0e1f4e8359c69c
-
SHA256
bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6
-
SHA512
85133f348cd0c3f632d6c57c1538bdf6dd40aa55370c2890e3b04b1a508bb0abb142f1e7553cceb8282470fb58a20c156d8b4925f19bf2e87b38cd247197f9f7
-
SSDEEP
1536:HcNHeb3XpCq0uAe7VeMC3+XFlZyQ2FYQtEUOJW:85g3XpCq04hr9d2FXvwW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3504 service2.exe 2096 service2.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "service2.exe" bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\service2.exe" service2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\service2.exe" bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1360 set thread context of 3916 1360 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 83 PID 3504 set thread context of 2096 3504 service2.exe 85 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1360 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 3504 service2.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1360 wrote to memory of 3916 1360 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 83 PID 1360 wrote to memory of 3916 1360 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 83 PID 1360 wrote to memory of 3916 1360 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 83 PID 1360 wrote to memory of 3916 1360 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 83 PID 1360 wrote to memory of 3916 1360 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 83 PID 1360 wrote to memory of 3916 1360 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 83 PID 1360 wrote to memory of 3916 1360 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 83 PID 1360 wrote to memory of 3916 1360 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 83 PID 3916 wrote to memory of 3504 3916 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 84 PID 3916 wrote to memory of 3504 3916 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 84 PID 3916 wrote to memory of 3504 3916 bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe 84 PID 3504 wrote to memory of 2096 3504 service2.exe 85 PID 3504 wrote to memory of 2096 3504 service2.exe 85 PID 3504 wrote to memory of 2096 3504 service2.exe 85 PID 3504 wrote to memory of 2096 3504 service2.exe 85 PID 3504 wrote to memory of 2096 3504 service2.exe 85 PID 3504 wrote to memory of 2096 3504 service2.exe 85 PID 3504 wrote to memory of 2096 3504 service2.exe 85 PID 3504 wrote to memory of 2096 3504 service2.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe"C:\Users\Admin\AppData\Local\Temp\bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exeC:\Users\Admin\AppData\Local\Temp\bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\service2.exe"C:\Users\Admin\AppData\Local\Temp\service2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\service2.exeC:\Users\Admin\AppData\Local\Temp\service2.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2096
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD540cd07cb2aa4f0cac808618b20e4d0ed
SHA1062514111f78e91787c0f2e88c0e1f4e8359c69c
SHA256bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6
SHA51285133f348cd0c3f632d6c57c1538bdf6dd40aa55370c2890e3b04b1a508bb0abb142f1e7553cceb8282470fb58a20c156d8b4925f19bf2e87b38cd247197f9f7
-
Filesize
82KB
MD540cd07cb2aa4f0cac808618b20e4d0ed
SHA1062514111f78e91787c0f2e88c0e1f4e8359c69c
SHA256bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6
SHA51285133f348cd0c3f632d6c57c1538bdf6dd40aa55370c2890e3b04b1a508bb0abb142f1e7553cceb8282470fb58a20c156d8b4925f19bf2e87b38cd247197f9f7
-
Filesize
82KB
MD540cd07cb2aa4f0cac808618b20e4d0ed
SHA1062514111f78e91787c0f2e88c0e1f4e8359c69c
SHA256bb5cf472e0d5283ab8c177872fa01e638e46d9fa83a2de44111b363a737f91c6
SHA51285133f348cd0c3f632d6c57c1538bdf6dd40aa55370c2890e3b04b1a508bb0abb142f1e7553cceb8282470fb58a20c156d8b4925f19bf2e87b38cd247197f9f7