Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2023, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
d27b20602db59697c20293d02aef1e433f98baf4.exe
Resource
win7-20221111-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
d27b20602db59697c20293d02aef1e433f98baf4.exe
Resource
win10v2004-20220812-en
8 signatures
150 seconds
General
-
Target
d27b20602db59697c20293d02aef1e433f98baf4.exe
-
Size
1.2MB
-
MD5
9190513275b80db066cc1a2275c01af1
-
SHA1
d27b20602db59697c20293d02aef1e433f98baf4
-
SHA256
36f828fc51e022714a6fd634e6b663919f332b67e9505ceb05d5c3b9398c6a00
-
SHA512
c425f57e05af494687b7b7d81252a5345d61554860a41d398346b5ca31fa229003c3ff0d570749d2eec146f142e701725724e279110c77df52ae7b4e6524f2dc
-
SSDEEP
12288:3Cw0bu5zZm+Sxkxm/X7hddTg1k8WtEGPObozGVzrj2roUVxAvWkZxsqJyMkZ6yEe:3ClP78fLPTu69tCT/4jwCv
Score
7/10
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1296 set thread context of 728 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 728 set thread context of 2424 728 jsc.exe 21 PID 2112 set thread context of 2424 2112 msdt.exe 21 -
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msdt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 728 jsc.exe 728 jsc.exe 728 jsc.exe 728 jsc.exe 728 jsc.exe 728 jsc.exe 728 jsc.exe 728 jsc.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2424 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 728 jsc.exe 728 jsc.exe 728 jsc.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe 2112 msdt.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe Token: SeDebugPrivilege 728 jsc.exe Token: SeShutdownPrivilege 2424 Explorer.EXE Token: SeCreatePagefilePrivilege 2424 Explorer.EXE Token: SeShutdownPrivilege 2424 Explorer.EXE Token: SeCreatePagefilePrivilege 2424 Explorer.EXE Token: SeDebugPrivilege 2112 msdt.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1296 wrote to memory of 3924 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 82 PID 1296 wrote to memory of 3924 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 82 PID 1296 wrote to memory of 4636 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 83 PID 1296 wrote to memory of 4636 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 83 PID 1296 wrote to memory of 3332 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 84 PID 1296 wrote to memory of 3332 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 84 PID 1296 wrote to memory of 3776 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 85 PID 1296 wrote to memory of 3776 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 85 PID 1296 wrote to memory of 2900 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 86 PID 1296 wrote to memory of 2900 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 86 PID 1296 wrote to memory of 728 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 1296 wrote to memory of 728 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 1296 wrote to memory of 728 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 1296 wrote to memory of 728 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 1296 wrote to memory of 728 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 1296 wrote to memory of 728 1296 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 2424 wrote to memory of 2112 2424 Explorer.EXE 88 PID 2424 wrote to memory of 2112 2424 Explorer.EXE 88 PID 2424 wrote to memory of 2112 2424 Explorer.EXE 88 PID 2112 wrote to memory of 4888 2112 msdt.exe 89 PID 2112 wrote to memory of 4888 2112 msdt.exe 89 PID 2112 wrote to memory of 4888 2112 msdt.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"3⤵PID:3924
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"3⤵PID:4636
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"3⤵PID:3332
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"3⤵PID:3776
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"3⤵PID:2900
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4888
-
-