Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-06-2023 01:43
Static task
static1
Behavioral task
behavioral1
Sample
ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe
Resource
win10v2004-20230220-en
General
-
Target
ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe
-
Size
50KB
-
MD5
9d846bb9fbd2e4ce0a2344b02d535e9c
-
SHA1
91bb1d20302d740b733d155bd42556038b900380
-
SHA256
ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07
-
SHA512
bd07b8443719dafadad2106dceeb5eec060b0606f3b9344495506ddcb40eebbac0b115430efe6b45a87579b120512b4a07e8d1903c11f8291d1712fe35fc1596
-
SSDEEP
768:7eX7e/XWwa+6NMLh2J84nhRDsMx1zO1fu8iSUKWay0CE5qb4rafuPg:iS/XWwP6NkohRoE1zOFoKWarefuPg
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1408 set thread context of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1924 564 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe Token: SeDebugPrivilege 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe Token: SeLoadDriverPrivilege 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1656 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 28 PID 1408 wrote to memory of 1656 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 28 PID 1408 wrote to memory of 1656 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 28 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 1408 wrote to memory of 564 1408 ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe 29 PID 564 wrote to memory of 1924 564 SetupUtility.exe 30 PID 564 wrote to memory of 1924 564 SetupUtility.exe 30 PID 564 wrote to memory of 1924 564 SetupUtility.exe 30 PID 564 wrote to memory of 1924 564 SetupUtility.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe"C:\Users\Admin\AppData\Local\Temp\ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:1656
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 1683⤵
- Program crash
PID:1924
-
-