Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 07:57
Behavioral task
behavioral1
Sample
1072a83c193e77a54f1935b2c1f4934a.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
1072a83c193e77a54f1935b2c1f4934a.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
1072a83c193e77a54f1935b2c1f4934a.exe
-
Size
1.0MB
-
MD5
1072a83c193e77a54f1935b2c1f4934a
-
SHA1
d942081ab814ff8f7fbc0980113466c7acf4f688
-
SHA256
6d87c385194f0def116818468b69ad2b3ee4ac94700e006cdf90aff7f3daf012
-
SHA512
75cc4ec31c213e191cfad58798e4086fc357a8f46d3eb7419ea570ff2885433a85c6730722aaae0ae070638c1f97f1acc54cbaa755868024cc40a115b8566e52
-
SSDEEP
12288:rbpHYUKy5U1bo9t8DMRSW9vbciUiLuAvOxMt11i27QitjNUUw:r5sJo6YrFUiyAak11LtjNw
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4596 svchest425075242507520.exe -
resource yara_rule behavioral2/memory/992-0-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/992-1-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/4596-12-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/4596-10-0x0000000000400000-0x0000000000597000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1072a83c193e77a54f1935b2c1f4934a.exe" 1072a83c193e77a54f1935b2c1f4934a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 992 1072a83c193e77a54f1935b2c1f4934a.exe 4596 svchest425075242507520.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\Windows\BJ.exe 1072a83c193e77a54f1935b2c1f4934a.exe File created \??\c:\Windows\BJ.exe 1072a83c193e77a54f1935b2c1f4934a.exe File created \??\c:\Windows\svchest425075242507520.exe 1072a83c193e77a54f1935b2c1f4934a.exe File opened for modification \??\c:\Windows\svchest425075242507520.exe 1072a83c193e77a54f1935b2c1f4934a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 992 wrote to memory of 4596 992 1072a83c193e77a54f1935b2c1f4934a.exe 16 PID 992 wrote to memory of 4596 992 1072a83c193e77a54f1935b2c1f4934a.exe 16 PID 992 wrote to memory of 4596 992 1072a83c193e77a54f1935b2c1f4934a.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\1072a83c193e77a54f1935b2c1f4934a.exe"C:\Users\Admin\AppData\Local\Temp\1072a83c193e77a54f1935b2c1f4934a.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:992 -
\??\c:\Windows\svchest425075242507520.exec:\Windows\svchest425075242507520.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4596
-