Analysis
-
max time kernel
36s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 11:29
Behavioral task
behavioral1
Sample
6ad05fe5b023a9978398732260862e45.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
6ad05fe5b023a9978398732260862e45.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
6ad05fe5b023a9978398732260862e45.exe
-
Size
160KB
-
MD5
6ad05fe5b023a9978398732260862e45
-
SHA1
cbcb55240e8b0b1bfe771a978da0cd5dbf495967
-
SHA256
9159aa81be2c0c8485ec3dbb657d4a1ceb3d01c1e08efbacc7d0c84d83b010d1
-
SHA512
a0a8a593570bf1699292779c2b2e7761c99c65a7c9fae3aeaae741c8060971a8cb9caeb6136afef36aaaf6d6793fdda1fa77926b5f35dabab1844bcefd0b8f00
-
SSDEEP
1536:XEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:0Y+4MiIkLZJNAQ9J6v
Score
10/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2248-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C08F60E1 = "C:\\Users\\Admin\\AppData\\Roaming\\C08F60E1\\bin.exe" winver.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4396 4964 WerFault.exe 18 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4964 winver.exe 4964 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3412 Explorer.EXE Token: SeCreatePagefilePrivilege 3412 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4964 winver.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2248 wrote to memory of 4964 2248 6ad05fe5b023a9978398732260862e45.exe 18 PID 2248 wrote to memory of 4964 2248 6ad05fe5b023a9978398732260862e45.exe 18 PID 2248 wrote to memory of 4964 2248 6ad05fe5b023a9978398732260862e45.exe 18 PID 2248 wrote to memory of 4964 2248 6ad05fe5b023a9978398732260862e45.exe 18 PID 4964 wrote to memory of 3412 4964 winver.exe 49 PID 4964 wrote to memory of 2476 4964 winver.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ad05fe5b023a9978398732260862e45.exe"C:\Users\Admin\AppData\Local\Temp\6ad05fe5b023a9978398732260862e45.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\winver.exewinver2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 3523⤵
- Program crash
PID:4396
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4964 -ip 49641⤵PID:864