Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2023 13:37
Static task
static1
Behavioral task
behavioral1
Sample
d27b20602db59697c20293d02aef1e433f98baf4.exe
Resource
win7-20220812-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
d27b20602db59697c20293d02aef1e433f98baf4.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
d27b20602db59697c20293d02aef1e433f98baf4.exe
-
Size
1.2MB
-
MD5
9190513275b80db066cc1a2275c01af1
-
SHA1
d27b20602db59697c20293d02aef1e433f98baf4
-
SHA256
36f828fc51e022714a6fd634e6b663919f332b67e9505ceb05d5c3b9398c6a00
-
SHA512
c425f57e05af494687b7b7d81252a5345d61554860a41d398346b5ca31fa229003c3ff0d570749d2eec146f142e701725724e279110c77df52ae7b4e6524f2dc
-
SSDEEP
12288:3Cw0bu5zZm+Sxkxm/X7hddTg1k8WtEGPObozGVzrj2roUVxAvWkZxsqJyMkZ6yEe:3ClP78fLPTu69tCT/4jwCv
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4396 set thread context of 4568 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 95 PID 4568 set thread context of 2440 4568 AddInProcess32.exe 11 PID 4064 set thread context of 2440 4064 chkdsk.exe 11 -
Program crash 1 IoCs
pid pid_target Process procid_target 1100 2192 WerFault.exe 103 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
description ioc Process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 4568 AddInProcess32.exe 4568 AddInProcess32.exe 4568 AddInProcess32.exe 4568 AddInProcess32.exe 4568 AddInProcess32.exe 4568 AddInProcess32.exe 4568 AddInProcess32.exe 4568 AddInProcess32.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2440 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4568 AddInProcess32.exe 4568 AddInProcess32.exe 4568 AddInProcess32.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe 4064 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe Token: SeDebugPrivilege 4568 AddInProcess32.exe Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeDebugPrivilege 4064 chkdsk.exe Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4396 wrote to memory of 3752 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 83 PID 4396 wrote to memory of 3752 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 83 PID 4396 wrote to memory of 2064 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 84 PID 4396 wrote to memory of 2064 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 84 PID 4396 wrote to memory of 664 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 85 PID 4396 wrote to memory of 664 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 85 PID 4396 wrote to memory of 4508 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 86 PID 4396 wrote to memory of 4508 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 86 PID 4396 wrote to memory of 208 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 4396 wrote to memory of 208 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 4396 wrote to memory of 4668 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 88 PID 4396 wrote to memory of 4668 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 88 PID 4396 wrote to memory of 4616 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 89 PID 4396 wrote to memory of 4616 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 89 PID 4396 wrote to memory of 1096 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 90 PID 4396 wrote to memory of 1096 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 90 PID 4396 wrote to memory of 1092 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 91 PID 4396 wrote to memory of 1092 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 91 PID 4396 wrote to memory of 1904 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 92 PID 4396 wrote to memory of 1904 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 92 PID 4396 wrote to memory of 5076 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 93 PID 4396 wrote to memory of 5076 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 93 PID 4396 wrote to memory of 4600 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 94 PID 4396 wrote to memory of 4600 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 94 PID 4396 wrote to memory of 4568 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 95 PID 4396 wrote to memory of 4568 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 95 PID 4396 wrote to memory of 4568 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 95 PID 4396 wrote to memory of 4568 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 95 PID 4396 wrote to memory of 4568 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 95 PID 4396 wrote to memory of 4568 4396 d27b20602db59697c20293d02aef1e433f98baf4.exe 95 PID 2440 wrote to memory of 4064 2440 Explorer.EXE 96 PID 2440 wrote to memory of 4064 2440 Explorer.EXE 96 PID 2440 wrote to memory of 4064 2440 Explorer.EXE 96 PID 4064 wrote to memory of 2192 4064 chkdsk.exe 103 PID 4064 wrote to memory of 2192 4064 chkdsk.exe 103 PID 4064 wrote to memory of 2192 4064 chkdsk.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"3⤵PID:3752
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"3⤵PID:2064
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"3⤵PID:664
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"3⤵PID:4508
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"3⤵PID:208
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"3⤵PID:4668
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"3⤵PID:4616
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"3⤵PID:1096
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"3⤵PID:1092
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"3⤵PID:1904
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"3⤵PID:5076
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"3⤵PID:4600
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2192
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2192 -s 1884⤵
- Program crash
PID:1100
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 476 -p 2192 -ip 21921⤵PID:2832