Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2023, 11:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
maxoysj4762.exe
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
maxoysj4762.exe
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
maxoysj4762.exe
-
Size
585KB
-
MD5
d6bf1f473ce21610f125492e27d1a4e4
-
SHA1
c51444cd94cbfb2f955f555feac4512ed7ef33d1
-
SHA256
898d893d7c46d0c70d498f0323b24175c4d49df99b88f57d30aef08cb3e3edca
-
SHA512
80bd6043c1db88b2c00225edfef7bc66f573421816c7b52f1a6478b09060dfd2b95994be549d11269f74b332c4cef8b79f9b430fb0da6ac21226b50ec1cc4b74
-
SSDEEP
12288:aHWHvZzn5JuHNKu0H4AMSpr7kIdhq8SKaGl7Cwu7k9QJ:a2Phn5otW4yZgmqjMZ6490
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation maxoysj4762.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4192 set thread context of 2824 4192 maxoysj4762.exe 93 -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 4192 maxoysj4762.exe 4192 maxoysj4762.exe 4192 maxoysj4762.exe 4192 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe 2824 maxoysj4762.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4192 maxoysj4762.exe Token: SeDebugPrivilege 2824 maxoysj4762.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4644 4192 maxoysj4762.exe 91 PID 4192 wrote to memory of 4644 4192 maxoysj4762.exe 91 PID 4192 wrote to memory of 4644 4192 maxoysj4762.exe 91 PID 4192 wrote to memory of 4836 4192 maxoysj4762.exe 92 PID 4192 wrote to memory of 4836 4192 maxoysj4762.exe 92 PID 4192 wrote to memory of 4836 4192 maxoysj4762.exe 92 PID 4192 wrote to memory of 2824 4192 maxoysj4762.exe 93 PID 4192 wrote to memory of 2824 4192 maxoysj4762.exe 93 PID 4192 wrote to memory of 2824 4192 maxoysj4762.exe 93 PID 4192 wrote to memory of 2824 4192 maxoysj4762.exe 93 PID 4192 wrote to memory of 2824 4192 maxoysj4762.exe 93 PID 4192 wrote to memory of 2824 4192 maxoysj4762.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"2⤵PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"2⤵PID:4836
-
-
C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"C:\Users\Admin\AppData\Local\Temp\maxoysj4762.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
Network
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request64.13.109.52.in-addr.arpaIN PTRResponse
-
260 B 5
-
322 B 7
-
322 B 7
-
260 B 5
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
64.13.109.52.in-addr.arpa