Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26/05/2023, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe
Resource
win10v2004-20230221-en
General
-
Target
a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe
-
Size
479KB
-
MD5
82433d5315e53ad0a675dec37b7ba466
-
SHA1
fc86670f0bffc539490f791ca011409a7bfb2b14
-
SHA256
a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e
-
SHA512
ee178177c1b8f62155ed619df27cc94ccc34d650b95598efaf7359379e8c678494ea45ec30704be0d3b6facb465a0401da93e1f6f8e6834b32bacb5a4ac76640
-
SSDEEP
6144:yk7uSDR0GhP0lm6i33cDvXwFpjmK/vCo13Zv1ww+AIJYhfb9nIaGq9aEDX:yk7uYGOai33RNDSoFZ/HbhfbyyUGX
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1244 set thread context of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 940 1584 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe Token: SeLoadDriverPrivilege 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe Token: SeDebugPrivilege 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1244 wrote to memory of 676 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 27 PID 1244 wrote to memory of 676 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 27 PID 1244 wrote to memory of 676 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 27 PID 1244 wrote to memory of 572 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 28 PID 1244 wrote to memory of 572 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 28 PID 1244 wrote to memory of 572 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 28 PID 1244 wrote to memory of 1296 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 29 PID 1244 wrote to memory of 1296 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 29 PID 1244 wrote to memory of 1296 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 29 PID 1244 wrote to memory of 1080 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 30 PID 1244 wrote to memory of 1080 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 30 PID 1244 wrote to memory of 1080 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 30 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1244 wrote to memory of 1584 1244 a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe 31 PID 1584 wrote to memory of 940 1584 Setup.exe 32 PID 1584 wrote to memory of 940 1584 Setup.exe 32 PID 1584 wrote to memory of 940 1584 Setup.exe 32 PID 1584 wrote to memory of 940 1584 Setup.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe"C:\Users\Admin\AppData\Local\Temp\a4c7865d9ba1a155c43e27d57a3d9c5729d52d4b5b49620567cdd9a1c7ac7a5e.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regtlibv12.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regtlibv12.exe"2⤵PID:676
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:572
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1296
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:1080
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\Setup.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\Setup.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 3043⤵
- Program crash
PID:940
-
-