Analysis
-
max time kernel
151s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 09:20
Static task
static1
Behavioral task
behavioral1
Sample
82d24e629fea0efc606dc2c7ec133f5df661f86b5105a3cb8ecca8b525e038e7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
82d24e629fea0efc606dc2c7ec133f5df661f86b5105a3cb8ecca8b525e038e7.exe
Resource
win10v2004-20220812-en
General
-
Target
82d24e629fea0efc606dc2c7ec133f5df661f86b5105a3cb8ecca8b525e038e7.exe
-
Size
75KB
-
MD5
992ae7dd9ab820aa9468b50a9d907789
-
SHA1
27fc99d018eea5349daa0f069bd5b5701a3f1339
-
SHA256
82d24e629fea0efc606dc2c7ec133f5df661f86b5105a3cb8ecca8b525e038e7
-
SHA512
710532090893220957da778e69f1fcf26567bc29f0318f2c9e42d2b93d5366060254101e8311119bc284b0bf3b22266ab0420f86f161c0aa7761061b95b95807
-
SSDEEP
1536:H7Ta9ccHro+mc95xO0KcmtCG+XHyl/ZDDDDDDDDD:H3IlHro+l9C0KUIDDDDDDDDD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Other.res" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1980 82d24e629fea0efc606dc2c7ec133f5df661f86b5105a3cb8ecca8b525e038e7.exe 980 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe 980 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1980 82d24e629fea0efc606dc2c7ec133f5df661f86b5105a3cb8ecca8b525e038e7.exe 1980 82d24e629fea0efc606dc2c7ec133f5df661f86b5105a3cb8ecca8b525e038e7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 980 svchost.exe 980 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 980 wrote to memory of 1840 980 svchost.exe 29 PID 980 wrote to memory of 1840 980 svchost.exe 29 PID 980 wrote to memory of 1840 980 svchost.exe 29 PID 980 wrote to memory of 1840 980 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\82d24e629fea0efc606dc2c7ec133f5df661f86b5105a3cb8ecca8b525e038e7.exe"C:\Users\Admin\AppData\Local\Temp\82d24e629fea0efc606dc2c7ec133f5df661f86b5105a3cb8ecca8b525e038e7.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:1980
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:1840
-