Analysis
-
max time kernel
29s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/05/2023, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
M7R65203.exe
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
M7R65203.exe
Resource
win10v2004-20230220-en
8 signatures
150 seconds
General
-
Target
M7R65203.exe
-
Size
479KB
-
MD5
e409bb37559c91b0f0e8e18303cd9674
-
SHA1
b3270898a5594f61f0e507d09602c722c8076ed0
-
SHA256
5e4066557c99489eedd7b360f985b50433dcd35f6c3a1a64731d9ec351d49895
-
SHA512
7abf1da3052aaef0eac7d41e1ec387ecbd5ae5799b4c6f8f3f145677424e927508322b5cade2270838ace4dea8d217c75198673bd48a8f3bacde75d536118da4
-
SSDEEP
12288:1G96r5g9LqY0yJKxOhwB3o6OvYkrKC4U4N157sAb:1NrALdJK4wB462Y11U4N1lb
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" M7R65203.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1304 set thread context of 876 1304 M7R65203.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 772 876 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1304 M7R65203.exe 1304 M7R65203.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1304 M7R65203.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1304 M7R65203.exe Token: SeLoadDriverPrivilege 1304 M7R65203.exe Token: SeDebugPrivilege 1304 M7R65203.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1252 1304 M7R65203.exe 28 PID 1304 wrote to memory of 1252 1304 M7R65203.exe 28 PID 1304 wrote to memory of 1252 1304 M7R65203.exe 28 PID 1304 wrote to memory of 2044 1304 M7R65203.exe 29 PID 1304 wrote to memory of 2044 1304 M7R65203.exe 29 PID 1304 wrote to memory of 2044 1304 M7R65203.exe 29 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 1304 wrote to memory of 876 1304 M7R65203.exe 30 PID 876 wrote to memory of 772 876 SetupUtility.exe 31 PID 876 wrote to memory of 772 876 SetupUtility.exe 31 PID 876 wrote to memory of 772 876 SetupUtility.exe 31 PID 876 wrote to memory of 772 876 SetupUtility.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\M7R65203.exe"C:\Users\Admin\AppData\Local\Temp\M7R65203.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:1252
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:2044
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 1683⤵
- Program crash
PID:772
-
-