Analysis
-
max time kernel
42s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/06/2023, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
bca1b67bff83c7176473408db7c326ed.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bca1b67bff83c7176473408db7c326ed.exe
Resource
win10v2004-20230220-en
General
-
Target
bca1b67bff83c7176473408db7c326ed.exe
-
Size
444KB
-
MD5
bca1b67bff83c7176473408db7c326ed
-
SHA1
5abb405146389a8dbf97f34d4d283307ca879cfd
-
SHA256
aaf61ffd433aa50c224ee70649d8543dd6377f036a0a4178bbdfe3536a4575a5
-
SHA512
82b77f1a1b7d53fe87f3b2de4085c50a60ca54c77b49769dd78dff884ee99950b6bb134f3eded1408c7fba694af3508755bb9912fcc26a8b388e153fbe2f452f
-
SSDEEP
6144:IjKvnAzRPqkroWHcrTIhB1uA2dOJhhgWbMbitWGFNuldsfiy3NiGA:Ijzgk00oIuA6ahE+F0/y36
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2036 created 1244 2036 bca1b67bff83c7176473408db7c326ed.exe 13 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2036 bca1b67bff83c7176473408db7c326ed.exe 2036 bca1b67bff83c7176473408db7c326ed.exe 2036 bca1b67bff83c7176473408db7c326ed.exe 2036 bca1b67bff83c7176473408db7c326ed.exe 684 certreq.exe 684 certreq.exe 684 certreq.exe 684 certreq.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2036 wrote to memory of 684 2036 bca1b67bff83c7176473408db7c326ed.exe 29 PID 2036 wrote to memory of 684 2036 bca1b67bff83c7176473408db7c326ed.exe 29 PID 2036 wrote to memory of 684 2036 bca1b67bff83c7176473408db7c326ed.exe 29 PID 2036 wrote to memory of 684 2036 bca1b67bff83c7176473408db7c326ed.exe 29 PID 2036 wrote to memory of 684 2036 bca1b67bff83c7176473408db7c326ed.exe 29 PID 2036 wrote to memory of 684 2036 bca1b67bff83c7176473408db7c326ed.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\bca1b67bff83c7176473408db7c326ed.exe"C:\Users\Admin\AppData\Local\Temp\bca1b67bff83c7176473408db7c326ed.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:684
-