Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 22:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
061bc8bed65e683ba7df2c7472bcac71.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
061bc8bed65e683ba7df2c7472bcac71.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
061bc8bed65e683ba7df2c7472bcac71.exe
-
Size
1.1MB
-
MD5
061bc8bed65e683ba7df2c7472bcac71
-
SHA1
02a6563ad694198912d686b8db87c8efca862df9
-
SHA256
7a71b51d58bfba8d1142e74d62c5b665611f4bbab49f5e3e3ccd2dec020f3e29
-
SHA512
dd6991666ff0ccaf37093aecc119c3eb0ec311f410ca285808919509302b2a47d06bbae79e1ea0ac0dafa6ecef18b5e46b6021f419a19413c82cc31f83576095
-
SSDEEP
24576:xCtI1E+e3PNdCxwa0uHmtSh5ErSS4raFdPbla0naZE:xaK28r9aXr
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 lAu3PTKrG4.exe -
Executes dropped EXE 2 IoCs
pid Process 1852 lAu3PTKrG4.exe 2564 lAu3PTKrG4.exe -
Loads dropped DLL 4 IoCs
pid Process 1296 061bc8bed65e683ba7df2c7472bcac71.exe 1296 061bc8bed65e683ba7df2c7472bcac71.exe 1296 061bc8bed65e683ba7df2c7472bcac71.exe 2564 lAu3PTKrG4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\HkhxGbRS2b = "C:\\ProgramData\\2tc1wNLoVLcKZ9\\lAu3PTKrG4.exe" 061bc8bed65e683ba7df2c7472bcac71.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1712 set thread context of 1296 1712 061bc8bed65e683ba7df2c7472bcac71.exe 29 PID 1852 set thread context of 2564 1852 lAu3PTKrG4.exe 30 PID 2564 set thread context of 2468 2564 lAu3PTKrG4.exe 31 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1296 1712 061bc8bed65e683ba7df2c7472bcac71.exe 29 PID 1712 wrote to memory of 1296 1712 061bc8bed65e683ba7df2c7472bcac71.exe 29 PID 1712 wrote to memory of 1296 1712 061bc8bed65e683ba7df2c7472bcac71.exe 29 PID 1712 wrote to memory of 1296 1712 061bc8bed65e683ba7df2c7472bcac71.exe 29 PID 1712 wrote to memory of 1296 1712 061bc8bed65e683ba7df2c7472bcac71.exe 29 PID 1712 wrote to memory of 1296 1712 061bc8bed65e683ba7df2c7472bcac71.exe 29 PID 1296 wrote to memory of 1852 1296 061bc8bed65e683ba7df2c7472bcac71.exe 28 PID 1296 wrote to memory of 1852 1296 061bc8bed65e683ba7df2c7472bcac71.exe 28 PID 1296 wrote to memory of 1852 1296 061bc8bed65e683ba7df2c7472bcac71.exe 28 PID 1296 wrote to memory of 1852 1296 061bc8bed65e683ba7df2c7472bcac71.exe 28 PID 1852 wrote to memory of 2564 1852 lAu3PTKrG4.exe 30 PID 1852 wrote to memory of 2564 1852 lAu3PTKrG4.exe 30 PID 1852 wrote to memory of 2564 1852 lAu3PTKrG4.exe 30 PID 1852 wrote to memory of 2564 1852 lAu3PTKrG4.exe 30 PID 1852 wrote to memory of 2564 1852 lAu3PTKrG4.exe 30 PID 1852 wrote to memory of 2564 1852 lAu3PTKrG4.exe 30 PID 2564 wrote to memory of 2468 2564 lAu3PTKrG4.exe 31 PID 2564 wrote to memory of 2468 2564 lAu3PTKrG4.exe 31 PID 2564 wrote to memory of 2468 2564 lAu3PTKrG4.exe 31 PID 2564 wrote to memory of 2468 2564 lAu3PTKrG4.exe 31 PID 2564 wrote to memory of 2468 2564 lAu3PTKrG4.exe 31 PID 2564 wrote to memory of 2468 2564 lAu3PTKrG4.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\061bc8bed65e683ba7df2c7472bcac71.exe"C:\Users\Admin\AppData\Local\Temp\061bc8bed65e683ba7df2c7472bcac71.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\061bc8bed65e683ba7df2c7472bcac71.exe"C:\Users\Admin\AppData\Local\Temp\061bc8bed65e683ba7df2c7472bcac71.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1296
-
-
C:\ProgramData\2tc1wNLoVLcKZ9\lAu3PTKrG4.exe"C:\ProgramData\2tc1wNLoVLcKZ9\lAu3PTKrG4.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\ProgramData\2tc1wNLoVLcKZ9\lAu3PTKrG4.exe"C:\ProgramData\2tc1wNLoVLcKZ9\lAu3PTKrG4.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Windows Media Player\wmpconfig.exe"C:\Program Files (x86)\Windows Media Player\wmpconfig.exe" /i:25643⤵PID:2468
-
-