Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-05-2023 12:41
Static task
static1
Behavioral task
behavioral1
Sample
6bb40ed95f770955ea7cf27e4785612e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6bb40ed95f770955ea7cf27e4785612e.exe
Resource
win10v2004-20230220-en
General
-
Target
6bb40ed95f770955ea7cf27e4785612e.exe
-
Size
533KB
-
MD5
6bb40ed95f770955ea7cf27e4785612e
-
SHA1
db93260f6bdeb2321fd73019af3d6182c97fd2c5
-
SHA256
f8ef3e3b18e72eebb4b18edbc90f7f5851ab0af044473fa2856fc974f0c33d6c
-
SHA512
e97a8aa76ebc4e473323cc8e7413fa8536ea57986f1fd4a45ec39bf3c86a817852fa2d9531c1bb622d0611d26e7afb970da9833220fc12b3170417718a1e12aa
-
SSDEEP
12288:NJsZ3dUdAz1aVlOsBfDtNK+UmDFZIdP03d0cMvNc:rsH6FvOYtNK+HrId03dEvS
Malware Config
Signatures
-
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral1/memory/1256-61-0x0000000000130000-0x0000000000145000-memory.dmp dave -
Processes:
resource yara_rule behavioral1/memory/1456-254-0x0000000004000000-0x000000000408E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6bb40ed95f770955ea7cf27e4785612e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\pigalicapi = "C:\\Users\\Admin\\pigalicapi.exe" 6bb40ed95f770955ea7cf27e4785612e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6bb40ed95f770955ea7cf27e4785612e.exedescription pid process target process PID 1256 set thread context of 1456 1256 6bb40ed95f770955ea7cf27e4785612e.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6bb40ed95f770955ea7cf27e4785612e.exepid process 1256 6bb40ed95f770955ea7cf27e4785612e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6bb40ed95f770955ea7cf27e4785612e.exedescription pid process target process PID 1256 wrote to memory of 1456 1256 6bb40ed95f770955ea7cf27e4785612e.exe svchost.exe PID 1256 wrote to memory of 1456 1256 6bb40ed95f770955ea7cf27e4785612e.exe svchost.exe PID 1256 wrote to memory of 1456 1256 6bb40ed95f770955ea7cf27e4785612e.exe svchost.exe PID 1256 wrote to memory of 1456 1256 6bb40ed95f770955ea7cf27e4785612e.exe svchost.exe PID 1256 wrote to memory of 1456 1256 6bb40ed95f770955ea7cf27e4785612e.exe svchost.exe PID 1256 wrote to memory of 1456 1256 6bb40ed95f770955ea7cf27e4785612e.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bb40ed95f770955ea7cf27e4785612e.exe"C:\Users\Admin\AppData\Local\Temp\6bb40ed95f770955ea7cf27e4785612e.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2961826002-3968192592-354541192-1000\c5d8393293ce2ba62f117b2c2d55bc3e_d22ff74c-717c-4b4c-858a-21b1fcc6aad4Filesize
1KB
MD5a7a82f9e73fa730a9eb510e4efcc125d
SHA1f0d994e6df428c4227013d4c9cab16a24f821c2e
SHA2562d8c86fcd2bff7aa3fa146d7c920edca2ae134bfe240dd310a576c3adc42acf8
SHA512ac12cd264ffd385c2c23a732d89e52c36d7ffecf451e08009ed0ac7cd489c8c6aa7ad28a72858c22b79a7cfca129de5070c14666fc6d92eace26448e714eef7b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2961826002-3968192592-354541192-1000\c5d8393293ce2ba62f117b2c2d55bc3e_d22ff74c-717c-4b4c-858a-21b1fcc6aad4Filesize
62B
MD560806f4f110a6f85831390dafbb98385
SHA19e27b0bad5f13310a1db8a0c155b3ad7c6b6e446
SHA256219d1a0d4109122414a4ef1b17d392652e94e7492b490ec6ff33ef553d125a4d
SHA512b56bf9de49451eded9debd004a8fd187e6af54a87ef8a1647b6d2f169fc8ef45fd5c6b118f46a4f587bb7f05a170d10cef80211a22d90612a7b6792d7494b6f2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2961826002-3968192592-354541192-1000\c5d8393293ce2ba62f117b2c2d55bc3e_d22ff74c-717c-4b4c-858a-21b1fcc6aad4Filesize
1KB
MD52e54cb504d31b3f004c268901bb98f43
SHA16fee3d56da5c4e7537bca564f1840cc1b7cb15f0
SHA256ac9023e2a66218fb85b87e4575ef5550f2d3246de15c5ddd311e6bb33ce68ae4
SHA512eca16490dff2ad4e2cc3e59d9793596e7508348cd0fe6a13eddaccdec931e6b30798d54878a3c6704125a16f68867bfa4e70bccbb83d2ea54b0d26066473389d
-
memory/1256-54-0x0000000000150000-0x0000000000168000-memory.dmpFilesize
96KB
-
memory/1256-58-0x0000000004000000-0x0000000004016000-memory.dmpFilesize
88KB
-
memory/1256-61-0x0000000000130000-0x0000000000145000-memory.dmpFilesize
84KB
-
memory/1456-250-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1456-252-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1456-254-0x0000000004000000-0x000000000408E000-memory.dmpFilesize
568KB
-
memory/1456-251-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1456-256-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB