Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23-08-2023 22:16
Static task
static1
Behavioral task
behavioral1
Sample
8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe
-
Size
1.8MB
-
MD5
6d7e095a82485bd3f67b75f0819953de
-
SHA1
b58a61dda953d9563aee122ea9a61e3dd9b1cefe
-
SHA256
8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be
-
SHA512
076cf4172e53a33caa7f8a2abeca2f172899f00d76fc36dac078a33904fbd38a1d9f27899ea6e4cbd9b9f1f954889c12e9a8e7b4afcfb0906b1004492830547e
-
SSDEEP
49152:sJ5W+3tzEfsRSbJtbCor2nLfQlyCAI0T:sa2LRSbreor+OT0
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Run\Serverx = "C:\\Windows\\system32\\Serverx.exe" 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Serverx.exe 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe File opened for modification C:\Windows\SysWOW64\Serverx.exe 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2112 1700 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe 1 PID 1700 wrote to memory of 2112 1700 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe 1 PID 1700 wrote to memory of 2112 1700 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe 1 PID 1700 wrote to memory of 2112 1700 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe 1 PID 1700 wrote to memory of 2112 1700 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe 1 PID 1700 wrote to memory of 2112 1700 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe 1 PID 1700 wrote to memory of 2112 1700 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe 1 PID 1700 wrote to memory of 1256 1700 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe 8 PID 1700 wrote to memory of 1256 1700 8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe 8
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe"C:\Users\Admin\AppData\Local\Temp\8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe"1⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe"C:\Users\Admin\AppData\Local\Temp\8a9e84fe35e5999638b7b00ba898ff219066955e9b45ff05b03b7e7c693ba5be.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1700
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256