Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2023, 08:26
Behavioral task
behavioral1
Sample
2f949910ba9c5268ad04c3c06f2bbe975254cfbebc0677fee6018f2777c392dd.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
2f949910ba9c5268ad04c3c06f2bbe975254cfbebc0677fee6018f2777c392dd.exe
Resource
win10v2004-20230621-en
General
-
Target
2f949910ba9c5268ad04c3c06f2bbe975254cfbebc0677fee6018f2777c392dd.exe
-
Size
608KB
-
MD5
a3cc859dcf2b9dee225ec67df2df946e
-
SHA1
ca349cf357680803f3ba28d7cf98579d05af2246
-
SHA256
2f949910ba9c5268ad04c3c06f2bbe975254cfbebc0677fee6018f2777c392dd
-
SHA512
522dc42800f939dd35838643f009ac326e492f62f1e4cb94cc4ff004749ef4dacf9d6408b3828d0cdd6e8bac13752d8f16c0a3fdb2e50cfccbfd90d9df2be56c
-
SSDEEP
12288:H6rpaGvJig6OC696XyXYbZBV/CvJk5CjU4tadKN3I2yVKv:arpaGvJG0w/2JJ5JIPY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4376-133-0x0000000000E20000-0x0000000000FDD000-memory.dmp vmprotect behavioral2/memory/4376-136-0x0000000000E20000-0x0000000000FDD000-memory.dmp vmprotect behavioral2/memory/4376-137-0x0000000000E20000-0x0000000000FDD000-memory.dmp vmprotect -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{05E6AB0E-223C-42F1-9C82-3E71187BFE3D}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{ACBAEE29-66D5-4BFE-AA34-7B5DA3FECEC6}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{67AC2842-3057-4A54-92D1-E670B6F1F43A}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{8314E3A6-0544-48B8-9309-1E068321A905}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{AFD207FB-4DDE-4A74-9721-A1F3508FDDDE}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{4928ED66-60B0-4723-8589-C88D1F9C5A74}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0AEFB24D-628D-4B55-A9F5-282980214316}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{FF07AC6E-CAE2-4B9D-AB43-F7224B0FC74D}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4376 2f949910ba9c5268ad04c3c06f2bbe975254cfbebc0677fee6018f2777c392dd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f949910ba9c5268ad04c3c06f2bbe975254cfbebc0677fee6018f2777c392dd.exe"C:\Users\Admin\AppData\Local\Temp\2f949910ba9c5268ad04c3c06f2bbe975254cfbebc0677fee6018f2777c392dd.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4376
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:4460