Analysis
-
max time kernel
148s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
10b5211afd960269d4fe6658d90ad20f.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
10b5211afd960269d4fe6658d90ad20f.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
10b5211afd960269d4fe6658d90ad20f.exe
-
Size
360KB
-
MD5
10b5211afd960269d4fe6658d90ad20f
-
SHA1
f8090a5b189f41137d209dffd51d298660d967a6
-
SHA256
0f4e573141c39156da0c48d8b1e2171b9089fe4497d31fa3f9f4f23d9d05c027
-
SHA512
d9439c81e63ec13e335ce6652b2ff853a5a97047c098c7f694655b918533af839f940ecebfb70efa0556020ad57709e49f5909cede2c0e998ddf55593b24ea76
-
SSDEEP
6144:f1EY61Rx6+XFBtpHdiFsuOP+Ne6JC5OVK5UQL81qItzv69HFJsaQdBZpjpOMlJ:yY673lpHdKKP+NRC5OVskqI5i9HFJ9iH
Score
8/10
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\BITS\Parameters\ServiceDll = "C:\\Windows\\system32\\svocdgs.dll" 10b5211afd960269d4fe6658d90ad20f.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svocdgs.dll 10b5211afd960269d4fe6658d90ad20f.exe File opened for modification C:\Windows\SysWOW64\svocdgs.dll 10b5211afd960269d4fe6658d90ad20f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4344 wrote to memory of 2940 4344 10b5211afd960269d4fe6658d90ad20f.exe 94 PID 4344 wrote to memory of 2940 4344 10b5211afd960269d4fe6658d90ad20f.exe 94 PID 4344 wrote to memory of 2940 4344 10b5211afd960269d4fe6658d90ad20f.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\10b5211afd960269d4fe6658d90ad20f.exe"C:\Users\Admin\AppData\Local\Temp\10b5211afd960269d4fe6658d90ad20f.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\10b5211afd960269d4fe6658d90ad20f.exe"2⤵PID:2940
-