Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe
Resource
win10v2004-20220901-en
General
-
Target
fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe
-
Size
388KB
-
MD5
f1dd4ff878dabe3b2ffdc4ecbbc1698e
-
SHA1
d2bb6f25b48ae7586c9fcf4c30d6da750ff5c5f6
-
SHA256
fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91
-
SHA512
23cbf21a475b3229483b60a4b11ed590ee424415ae8b55a3c44511b5d194ed47e67d3a56033ca4f7352af641e75bb22bdf496d05bcd27558c5ee42115063253b
-
SSDEEP
6144:qMnug2BfOMkdu5ishd9/1JV8MFPJ5FydmbJfA+U6A0GsOnzDMoO4:qMnoBGMkdQhJVLJF+IFy6sz1O4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 628 aK01831NiKmB01831.exe -
resource yara_rule behavioral2/memory/4940-135-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/628-136-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\aK01831NiKmB01831 = "C:\\ProgramData\\aK01831NiKmB01831\\aK01831NiKmB01831.exe" aK01831NiKmB01831.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4940 fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe 4940 fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe 4940 fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe 4940 fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe 4940 fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe 4940 fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4940 fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe Token: SeDebugPrivilege 628 aK01831NiKmB01831.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 628 aK01831NiKmB01831.exe 628 aK01831NiKmB01831.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4940 wrote to memory of 628 4940 fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe 80 PID 4940 wrote to memory of 628 4940 fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe 80 PID 4940 wrote to memory of 628 4940 fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe"C:\Users\Admin\AppData\Local\Temp\fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\ProgramData\aK01831NiKmB01831\aK01831NiKmB01831.exe"C:\ProgramData\aK01831NiKmB01831\aK01831NiKmB01831.exe" "C:\Users\Admin\AppData\Local\Temp\fc87acfa2020019252cf33c1c914cbf6b0a55113eed4dfd06e129359b5864c91.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:628
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5640ee7e42156c8ee78cf0c553cec78bd
SHA16b07f9223cafb13eced4bcf515e35387176ef8ef
SHA2563707d044dd8df4ae105b364b4eb3925d042f647f0a3aa75c64458690f16fe64e
SHA51263e480f2091f21979338713b658c492bd1d8a5fb09cfb12c288a63ed787f7bebd91867107a8f072d508dcbaeb37d68c4b4b91a135f9badf03305670ca74fe650
-
Filesize
388KB
MD5640ee7e42156c8ee78cf0c553cec78bd
SHA16b07f9223cafb13eced4bcf515e35387176ef8ef
SHA2563707d044dd8df4ae105b364b4eb3925d042f647f0a3aa75c64458690f16fe64e
SHA51263e480f2091f21979338713b658c492bd1d8a5fb09cfb12c288a63ed787f7bebd91867107a8f072d508dcbaeb37d68c4b4b91a135f9badf03305670ca74fe650