Analysis
-
max time kernel
79s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2023, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
de838e5735362a226e5f0b8a61fce1c9eae8737415879374bc395dffbf2abbd0.exe
Resource
win10v2004-20230220-en
General
-
Target
de838e5735362a226e5f0b8a61fce1c9eae8737415879374bc395dffbf2abbd0.exe
-
Size
7.6MB
-
MD5
1b7a6686e9676e64e9bec2186777ba76
-
SHA1
49a285cc9a4600b097fb131c314f9c86fc0ef9ce
-
SHA256
de838e5735362a226e5f0b8a61fce1c9eae8737415879374bc395dffbf2abbd0
-
SHA512
eaf8f1306407a60a98c1c75dda8cb72747c335251f7eb6b1ce173ea72177c01e4fada978c746107e5bbd8ce6410e2e147beabc2e471c8de2a9f9e6a151fa09f0
-
SSDEEP
98304:UaGU/L/YC5GhcypKSEV25T3AwRlNpKlBKM1iEcy0Lg8ksEztOlaA:UGgNNpKp+TQwRDpswfI0LpksEztO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1908 USOSharedDesktop-ver9.7.3.2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Windows\CurrentVersion\Run de838e5735362a226e5f0b8a61fce1c9eae8737415879374bc395dffbf2abbd0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\USOSharedDesktop-ver9.7.3.2 = "C:\\ProgramData\\USOSharedDesktop-ver9.7.3.2\\USOSharedDesktop-ver9.7.3.2.exe" de838e5735362a226e5f0b8a61fce1c9eae8737415879374bc395dffbf2abbd0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1180 wrote to memory of 1908 1180 de838e5735362a226e5f0b8a61fce1c9eae8737415879374bc395dffbf2abbd0.exe 82 PID 1180 wrote to memory of 1908 1180 de838e5735362a226e5f0b8a61fce1c9eae8737415879374bc395dffbf2abbd0.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\de838e5735362a226e5f0b8a61fce1c9eae8737415879374bc395dffbf2abbd0.exe"C:\Users\Admin\AppData\Local\Temp\de838e5735362a226e5f0b8a61fce1c9eae8737415879374bc395dffbf2abbd0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\ProgramData\USOSharedDesktop-ver9.7.3.2\USOSharedDesktop-ver9.7.3.2.exeC:\ProgramData\USOSharedDesktop-ver9.7.3.2\USOSharedDesktop-ver9.7.3.2.exe2⤵
- Executes dropped EXE
PID:1908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
757.6MB
MD5121e654d4f82b3da66bbfba760cf1c48
SHA1a586c60323bed7dbae52943d44eefd2f62727224
SHA25622b194dde54cd95c19e339746b741a174e01bcea8781bb9c570c489745d0519e
SHA5127f1ba1bf0a6c24ea15e1204c83f77d8f25bfe0236a31279cfc242d0490aef201e687c1d88327f3a250c700f3950b5240fd198f61753002a466155bd9d99a0c9a
-
Filesize
757.6MB
MD5121e654d4f82b3da66bbfba760cf1c48
SHA1a586c60323bed7dbae52943d44eefd2f62727224
SHA25622b194dde54cd95c19e339746b741a174e01bcea8781bb9c570c489745d0519e
SHA5127f1ba1bf0a6c24ea15e1204c83f77d8f25bfe0236a31279cfc242d0490aef201e687c1d88327f3a250c700f3950b5240fd198f61753002a466155bd9d99a0c9a