Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
1856f199935366cd0a168fafe5938929.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1856f199935366cd0a168fafe5938929.exe
Resource
win10v2004-20231222-en
General
-
Target
1856f199935366cd0a168fafe5938929.exe
-
Size
51KB
-
MD5
1856f199935366cd0a168fafe5938929
-
SHA1
3a94bf987f1521f555b49f2e75a61c7d2a5735ef
-
SHA256
26131fce17a25f1d11f3e422a9e2d57dfc9181d53d8f553966020f08163fb382
-
SHA512
c67eeffac8891e7357916261b916b5caf88c72553193b098b1fa1d91c6f4b888943da2356a70f64354cfbc5c02bfed37864095198a5aa1eac9d0688bd82e2c08
-
SSDEEP
768:Bgk/F9qndDUEOAsCmBR2/G51iNyDDfJLKnbswqIKETqcKO:VTqndNOVBj5cgxenbswqIKQP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1740 fxstaller.exe 3140 fxstaller.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center = "fxstaller.exe" 1856f199935366cd0a168fafe5938929.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4912 set thread context of 4520 4912 1856f199935366cd0a168fafe5938929.exe 21 PID 1740 set thread context of 3140 1740 fxstaller.exe 103 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fxstaller.exe 1856f199935366cd0a168fafe5938929.exe File opened for modification C:\Windows\fxstaller.exe 1856f199935366cd0a168fafe5938929.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4520 4912 1856f199935366cd0a168fafe5938929.exe 21 PID 4912 wrote to memory of 4520 4912 1856f199935366cd0a168fafe5938929.exe 21 PID 4912 wrote to memory of 4520 4912 1856f199935366cd0a168fafe5938929.exe 21 PID 4912 wrote to memory of 4520 4912 1856f199935366cd0a168fafe5938929.exe 21 PID 4912 wrote to memory of 4520 4912 1856f199935366cd0a168fafe5938929.exe 21 PID 4912 wrote to memory of 4520 4912 1856f199935366cd0a168fafe5938929.exe 21 PID 4912 wrote to memory of 4520 4912 1856f199935366cd0a168fafe5938929.exe 21 PID 4520 wrote to memory of 1740 4520 1856f199935366cd0a168fafe5938929.exe 102 PID 4520 wrote to memory of 1740 4520 1856f199935366cd0a168fafe5938929.exe 102 PID 4520 wrote to memory of 1740 4520 1856f199935366cd0a168fafe5938929.exe 102 PID 1740 wrote to memory of 3140 1740 fxstaller.exe 103 PID 1740 wrote to memory of 3140 1740 fxstaller.exe 103 PID 1740 wrote to memory of 3140 1740 fxstaller.exe 103 PID 1740 wrote to memory of 3140 1740 fxstaller.exe 103 PID 1740 wrote to memory of 3140 1740 fxstaller.exe 103 PID 1740 wrote to memory of 3140 1740 fxstaller.exe 103 PID 1740 wrote to memory of 3140 1740 fxstaller.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\1856f199935366cd0a168fafe5938929.exe"C:\Users\Admin\AppData\Local\Temp\1856f199935366cd0a168fafe5938929.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\1856f199935366cd0a168fafe5938929.exeC:\Users\Admin\AppData\Local\Temp\1856f199935366cd0a168fafe5938929.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\fxstaller.exe"C:\Windows\fxstaller.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\fxstaller.exeC:\Windows\fxstaller.exe4⤵
- Executes dropped EXE
PID:3140
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD51856f199935366cd0a168fafe5938929
SHA13a94bf987f1521f555b49f2e75a61c7d2a5735ef
SHA25626131fce17a25f1d11f3e422a9e2d57dfc9181d53d8f553966020f08163fb382
SHA512c67eeffac8891e7357916261b916b5caf88c72553193b098b1fa1d91c6f4b888943da2356a70f64354cfbc5c02bfed37864095198a5aa1eac9d0688bd82e2c08