Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 18:32
Behavioral task
behavioral1
Sample
0c15c2b40fd0a496a1ca36d3fbb203c1.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
0c15c2b40fd0a496a1ca36d3fbb203c1.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
0c15c2b40fd0a496a1ca36d3fbb203c1.exe
-
Size
885KB
-
MD5
0c15c2b40fd0a496a1ca36d3fbb203c1
-
SHA1
01312c3806c9a9d6aa8be11f196544f4d7afaee3
-
SHA256
6c78f42692176f97269807e4a685a2c9d5d0a811cfa5ccb65b63e2a6da80d182
-
SHA512
0764bbb2689e99e28b9983553bd9a8eb6eda97428c161c9fcc7dff49ee130d4eff56769a7c24144ec0fffeedf2f18139f88eb70651fd97f44eb15421401080ad
-
SSDEEP
12288:rbpHYUKy5U1bo9t8DMRSW9vbciUiLuAvOxMt11i27QitjBHANNVAUNE:r5sJo6YrFUiyAak11LtjJ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3148 svchest425075242507520.exe -
resource yara_rule behavioral2/memory/2044-0-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/2044-1-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/3148-10-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/3148-12-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/2044-13-0x0000000000400000-0x0000000000597000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0c15c2b40fd0a496a1ca36d3fbb203c1.exe" 0c15c2b40fd0a496a1ca36d3fbb203c1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2044 0c15c2b40fd0a496a1ca36d3fbb203c1.exe 3148 svchest425075242507520.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\Windows\svchest425075242507520.exe 0c15c2b40fd0a496a1ca36d3fbb203c1.exe File created \??\c:\Windows\BJ.exe 0c15c2b40fd0a496a1ca36d3fbb203c1.exe File opened for modification \??\c:\Windows\BJ.exe 0c15c2b40fd0a496a1ca36d3fbb203c1.exe File created \??\c:\Windows\svchest425075242507520.exe 0c15c2b40fd0a496a1ca36d3fbb203c1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2044 wrote to memory of 3148 2044 0c15c2b40fd0a496a1ca36d3fbb203c1.exe 22 PID 2044 wrote to memory of 3148 2044 0c15c2b40fd0a496a1ca36d3fbb203c1.exe 22 PID 2044 wrote to memory of 3148 2044 0c15c2b40fd0a496a1ca36d3fbb203c1.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c15c2b40fd0a496a1ca36d3fbb203c1.exe"C:\Users\Admin\AppData\Local\Temp\0c15c2b40fd0a496a1ca36d3fbb203c1.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\Windows\svchest425075242507520.exec:\Windows\svchest425075242507520.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3148
-