Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2023, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
8b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6.exe
Resource
win10v2004-20230220-en
General
-
Target
8b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6.exe
-
Size
7.1MB
-
MD5
afe8880c2e8d22c06c081cb8a6412007
-
SHA1
5342e170129c59be522287ec7319c571da919531
-
SHA256
8b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6
-
SHA512
e5bd72d497f957dc717983fd48771f64f9e6098e75d615b748532c457041e7d6517b8400213209b22ee396388d30219e3093f448f171403eed5ac03eb339d922
-
SSDEEP
98304:Q99qecCB6IZzkdPHMdD5zCb8Xr7ipkmSKDRPez7+SMOxW4m/rzK+CXQ:Q996gZCfI1vipkmSAJZGW1//FN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4164 regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3 = "C:\\ProgramData\\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3\\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3.exe" 8b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows\CurrentVersion\Run 8b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4360 wrote to memory of 4164 4360 8b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6.exe 82 PID 4360 wrote to memory of 4164 4360 8b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6.exe"C:\Users\Admin\AppData\Local\Temp\8b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\ProgramData\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3.exeC:\ProgramData\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3.exe2⤵
- Executes dropped EXE
PID:4164
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3.exe
Filesize7.1MB
MD5afe8880c2e8d22c06c081cb8a6412007
SHA15342e170129c59be522287ec7319c571da919531
SHA2568b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6
SHA512e5bd72d497f957dc717983fd48771f64f9e6098e75d615b748532c457041e7d6517b8400213209b22ee396388d30219e3093f448f171403eed5ac03eb339d922
-
C:\ProgramData\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3\regid.1991-06.com.microsoftDesktop-VQ26W7.2.7.3.exe
Filesize7.1MB
MD5afe8880c2e8d22c06c081cb8a6412007
SHA15342e170129c59be522287ec7319c571da919531
SHA2568b4a2520fa3b3e89b1462ae8573474c820fac1964dbdb7f6d120bd0fa5d705d6
SHA512e5bd72d497f957dc717983fd48771f64f9e6098e75d615b748532c457041e7d6517b8400213209b22ee396388d30219e3093f448f171403eed5ac03eb339d922