Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 05:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
boolhongupdater0.2.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
boolhongupdater0.2.exe
Resource
win10v2004-20230831-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
boolhongupdater0.2.exe
-
Size
3.1MB
-
MD5
e03f0567a9bb99e664bdc1d12aa21677
-
SHA1
8483f5a57b107430cc899f5bfb1dfa434e3690a5
-
SHA256
4cb6e9aebf1e565f4cb11b4bddcf9b7afcf56c390c1e2d849a64b31b997547ae
-
SHA512
31c82a1ae1aa3799e6a96fd350baf7036c1abd9898f108ac478d7b10a63749353b644eeb691b9e108d0a4a7f8a1f11c0b051002e39a2f9c035fbfaf0dbef2dea
-
SSDEEP
49152:ImK/wTPCM7YgUtlCUr8j2f0alT7Vzw3OBT+7Gm8vo4j3cxeHHxzB1A1Jcea:IkKM7eXhgMT763OEv8wQsIVB61/a
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updater" MSBuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
MSBuild.exepid process 1952 MSBuild.exe 1952 MSBuild.exe 1952 MSBuild.exe 1952 MSBuild.exe 1952 MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
boolhongupdater0.2.exedescription pid process target process PID 1376 set thread context of 1952 1376 boolhongupdater0.2.exe MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
boolhongupdater0.2.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1376 boolhongupdater0.2.exe Token: SeDebugPrivilege 1952 MSBuild.exe Token: SeShutdownPrivilege 1952 MSBuild.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MSBuild.exepid process 1952 MSBuild.exe 1952 MSBuild.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
boolhongupdater0.2.exedescription pid process target process PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe PID 1376 wrote to memory of 1952 1376 boolhongupdater0.2.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\boolhongupdater0.2.exe"C:\Users\Admin\AppData\Local\Temp\boolhongupdater0.2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1952