Analysis
-
max time kernel
158s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 20:35
Static task
static1
Behavioral task
behavioral1
Sample
1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe
Resource
win10v2004-20220812-en
General
-
Target
1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe
-
Size
191KB
-
MD5
a3b8641a927d14eb1d40f703392080e5
-
SHA1
4b6c4157ce9089b9d3f24ac588552519709dd84e
-
SHA256
1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad
-
SHA512
6c9994306fd2f09df92a50cf5a91d7d77f32845adca9cae94feec2d7126d4834a50de2581e01b09cae30b8da3de2e61fbd08036932f224b9d7adae92af22fa00
-
SSDEEP
3072:LpGs3Qkj524uK1hbORQRB0uCMotd5T2/Ap+9Cq6OwZpwzOI:LYYV52+18OBZV0PK8BL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4924 cmd.exe -
Unexpected DNS network traffic destination 6 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.165.17.4 Destination IP 194.165.17.4 Destination IP 194.165.17.4 Destination IP 194.165.17.4 Destination IP 194.165.17.4 Destination IP 194.165.17.4 -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Update = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Desktop\\Install\\{e0613d90-9b67-ae60-58f9-584af5f18b89}\\❤≸⋙\\Ⱒ☠⍨\\\u202eﯹ๛\\{e0613d90-9b67-ae60-58f9-584af5f18b89}\\GoogleUpdate.exe\" >" 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4160 set thread context of 4924 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe 81 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 740 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe Token: SeDebugPrivilege 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe Token: SeDebugPrivilege 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 740 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4924 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe 81 PID 4160 wrote to memory of 4924 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe 81 PID 4160 wrote to memory of 4924 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe 81 PID 4160 wrote to memory of 4924 4160 1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe"C:\Users\Admin\AppData\Local\Temp\1fc4997ee696465f16dae57509ba5837ca351712ed4126cba2b2367c616a68ad.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Deletes itself
PID:4924
-