Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
Pivnoxybggcadheda28_browsingExe.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Pivnoxybggcadheda28_browsingExe.exe
Resource
win10v2004-20230703-en
General
-
Target
Pivnoxybggcadheda28_browsingExe.exe
-
Size
160KB
-
MD5
4bc743b0f4090cdd0c0fbcebfa996de9
-
SHA1
1bbde685776cd633786d78ebdebd3f077fe82448
-
SHA256
9f93a50cadd762d36788ce1c8d5deb2d26e109f717f3e2d4d5c8f0d3344de725
-
SHA512
3c896870985a1af9d25151495e96e709e75afd1bc42fdf526bd4ef428393805a5dea2032fb6aa8491fbfa660a9d88cc4fdfce564d440b1d8ca57ee6485b5d884
-
SSDEEP
3072:6yoHBBC3ueOa7Wigo11C0m3+qN6AiWSvDxX4WyB:6dPCv97W2gf+C6vVt4Wy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 924 confax.exe -
Loads dropped DLL 1 IoCs
pid Process 924 confax.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Hux91 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\confax.exe" confax.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4264 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1072 Pivnoxybggcadheda28_browsingExe.exe 1072 Pivnoxybggcadheda28_browsingExe.exe 1072 Pivnoxybggcadheda28_browsingExe.exe 1072 Pivnoxybggcadheda28_browsingExe.exe 1072 Pivnoxybggcadheda28_browsingExe.exe 1072 Pivnoxybggcadheda28_browsingExe.exe 924 confax.exe 924 confax.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 924 confax.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1072 Pivnoxybggcadheda28_browsingExe.exe 1072 Pivnoxybggcadheda28_browsingExe.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1072 wrote to memory of 924 1072 Pivnoxybggcadheda28_browsingExe.exe 86 PID 1072 wrote to memory of 924 1072 Pivnoxybggcadheda28_browsingExe.exe 86 PID 1072 wrote to memory of 924 1072 Pivnoxybggcadheda28_browsingExe.exe 86 PID 924 wrote to memory of 4168 924 confax.exe 87 PID 924 wrote to memory of 4168 924 confax.exe 87 PID 924 wrote to memory of 4168 924 confax.exe 87 PID 4168 wrote to memory of 4264 4168 cmd.exe 89 PID 4168 wrote to memory of 4264 4168 cmd.exe 89 PID 4168 wrote to memory of 4264 4168 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pivnoxybggcadheda28_browsingExe.exe"C:\Users\Admin\AppData\Local\Temp\Pivnoxybggcadheda28_browsingExe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\confax.exeC:\Users\Admin\AppData\Local\Temp\confax.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\heguv.cmd3⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 124⤵
- Runs ping.exe
PID:4264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD587340ff500e114399e046b0f14f294c4
SHA11b5ae33cb87070e4e96195a8c76a8cdbf039d983
SHA2560fd13b231be06cfa0007d9592fb5438bc629ebbf40ba733c714fca9e89791851
SHA51269bc71b36c308d7b79697d3e21d30a24e3684c5fb5c8346f40ee8e1f51d3f1a01b935dd5cb44164b27bc832a040b26a0ec5ee4977edb64ce60cdd935a76d0f42
-
Filesize
168KB
MD587340ff500e114399e046b0f14f294c4
SHA11b5ae33cb87070e4e96195a8c76a8cdbf039d983
SHA2560fd13b231be06cfa0007d9592fb5438bc629ebbf40ba733c714fca9e89791851
SHA51269bc71b36c308d7b79697d3e21d30a24e3684c5fb5c8346f40ee8e1f51d3f1a01b935dd5cb44164b27bc832a040b26a0ec5ee4977edb64ce60cdd935a76d0f42
-
Filesize
53KB
MD5ff992b4aa59884ad153c887fbb7155fc
SHA17897ae73e8ad10548e4828a4b45a798b5472323d
SHA2567aadcb53ca413648eba86d01490038d4c0763bceb5875abceb10da12d4d6a2dd
SHA512ce9ec7931fc5c7ab47c42a105c96e823fe3ab1c8b1a8916661501c47bec5b04901e55c152ac87531e03d3733c878397c869bee6ab3c1927fb68869e897fbba3a
-
Filesize
53KB
MD5ff992b4aa59884ad153c887fbb7155fc
SHA17897ae73e8ad10548e4828a4b45a798b5472323d
SHA2567aadcb53ca413648eba86d01490038d4c0763bceb5875abceb10da12d4d6a2dd
SHA512ce9ec7931fc5c7ab47c42a105c96e823fe3ab1c8b1a8916661501c47bec5b04901e55c152ac87531e03d3733c878397c869bee6ab3c1927fb68869e897fbba3a
-
Filesize
2KB
MD5a339d0219b5f581eb503e5d245cbe39a
SHA17e06ca72c504ef2f2b666a39242ff0964a826873
SHA25684c2521cfe485a2b2b26ba1992241d7fbdd684e150413277915abac11d2a8c44
SHA512a80a42401a11cf2e0ec916fcbe1ab345cc3cb92a2e072d0818eef889307dc64a06fced53407fe17089402fd390176a5af65c0ad695777e293ef9916d761eb072