Analysis
-
max time kernel
88s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 00:49
Behavioral task
behavioral1
Sample
73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe
Resource
win10v2004-20220812-en
General
-
Target
73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe
-
Size
80KB
-
MD5
843a38945579fc3e817b47275d2e74fb
-
SHA1
000083db391516241f69d3d8d86e9e53797e4e00
-
SHA256
73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b
-
SHA512
4278d4c49f47a0dcea00748355f86e603f10867ea1c7223a74468a74bb952ad226b78bbce09b4353e0408375653ee99619710a816ed5a6e7ea33a64bdd54276c
-
SSDEEP
1536:1BskKNqRSQ911QzZZDEHrVSEnaiBIjStXpNHAQO3KW3wDbk2wI+2eJTma:1Bs9NUSKbeZZDUrV5nZBIjSZH8d2wI+x
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{3G4L2686-J4L1-X5MV-12RE-JFH5V38F5030} 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3G4L2686-J4L1-X5MV-12RE-JFH5V38F5030}\StubPath = "C:\\Windows\\system32\\Coffin Of Evil.exe Restart" 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe -
resource yara_rule behavioral2/memory/4952-132-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4952-134-0x0000000010410000-0x0000000010443000-memory.dmp upx behavioral2/memory/4952-138-0x0000000000580000-0x00000000005B3000-memory.dmp upx behavioral2/memory/4952-141-0x0000000000580000-0x00000000005B3000-memory.dmp upx behavioral2/memory/4952-142-0x0000000000580000-0x00000000005B3000-memory.dmp upx behavioral2/memory/4952-143-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4952-144-0x0000000000580000-0x00000000005B3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xcrx = "C:\\Windows\\system32\\Coffin Of Evil.exe" 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xdocx = "C:\\Windows\\system32\\Coffin Of Evil.exe" 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\logs.dat 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe File opened for modification C:\Windows\SysWOW64\logs.dat 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe File created C:\Windows\SysWOW64\Coffin Of Evil.exe 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe File opened for modification C:\Windows\SysWOW64\Coffin Of Evil.exe 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe Token: SeDebugPrivilege 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe Token: SeDebugPrivilege 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe Token: SeDebugPrivilege 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80 PID 4952 wrote to memory of 4892 4952 73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe"C:\Users\Admin\AppData\Local\Temp\73e9f0a8512fe9f665027060075b0a89d1b4aa6a1d837a3781233aec8662d87b.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:4892
-