Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2023, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
bca1b67bff83c7176473408db7c326ed.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bca1b67bff83c7176473408db7c326ed.exe
Resource
win10v2004-20230220-en
General
-
Target
bca1b67bff83c7176473408db7c326ed.exe
-
Size
444KB
-
MD5
bca1b67bff83c7176473408db7c326ed
-
SHA1
5abb405146389a8dbf97f34d4d283307ca879cfd
-
SHA256
aaf61ffd433aa50c224ee70649d8543dd6377f036a0a4178bbdfe3536a4575a5
-
SHA512
82b77f1a1b7d53fe87f3b2de4085c50a60ca54c77b49769dd78dff884ee99950b6bb134f3eded1408c7fba694af3508755bb9912fcc26a8b388e153fbe2f452f
-
SSDEEP
6144:IjKvnAzRPqkroWHcrTIhB1uA2dOJhhgWbMbitWGFNuldsfiy3NiGA:Ijzgk00oIuA6ahE+F0/y36
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4348 created 3168 4348 bca1b67bff83c7176473408db7c326ed.exe 55 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4348 bca1b67bff83c7176473408db7c326ed.exe 4348 bca1b67bff83c7176473408db7c326ed.exe 4348 bca1b67bff83c7176473408db7c326ed.exe 4348 bca1b67bff83c7176473408db7c326ed.exe 3784 certreq.exe 3784 certreq.exe 3784 certreq.exe 3784 certreq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3784 4348 bca1b67bff83c7176473408db7c326ed.exe 85 PID 4348 wrote to memory of 3784 4348 bca1b67bff83c7176473408db7c326ed.exe 85 PID 4348 wrote to memory of 3784 4348 bca1b67bff83c7176473408db7c326ed.exe 85 PID 4348 wrote to memory of 3784 4348 bca1b67bff83c7176473408db7c326ed.exe 85
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\bca1b67bff83c7176473408db7c326ed.exe"C:\Users\Admin\AppData\Local\Temp\bca1b67bff83c7176473408db7c326ed.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4348
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3784
-