Analysis
-
max time kernel
44s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 17:43
Behavioral task
behavioral1
Sample
4c113be262adac7b253efc2b4ce9e93e.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c113be262adac7b253efc2b4ce9e93e.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
4c113be262adac7b253efc2b4ce9e93e.exe
-
Size
160KB
-
MD5
4c113be262adac7b253efc2b4ce9e93e
-
SHA1
590e76f4df7f3a1ba155933e06198395610bfd99
-
SHA256
c0d361938370a4c318194b3140cc57984291f95b7f12e1d4577cbffe47c049e3
-
SHA512
ad81eabcbd570772d603270b2466d2f6e46f6964cdec2574f5c11fbcac63e9a28508708e4ac6d1bb992d3c90e5212bce295620bc21a9c4718f08e18e950fb005
-
SSDEEP
1536:mEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:NY+4MiIkLZJNAQ9J6v
Score
10/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3004-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AAB62D9F = "C:\\Users\\Admin\\AppData\\Roaming\\AAB62D9F\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5040 winver.exe 5040 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5040 winver.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3004 wrote to memory of 5040 3004 4c113be262adac7b253efc2b4ce9e93e.exe 93 PID 3004 wrote to memory of 5040 3004 4c113be262adac7b253efc2b4ce9e93e.exe 93 PID 3004 wrote to memory of 5040 3004 4c113be262adac7b253efc2b4ce9e93e.exe 93 PID 3004 wrote to memory of 5040 3004 4c113be262adac7b253efc2b4ce9e93e.exe 93 PID 5040 wrote to memory of 3432 5040 winver.exe 68 PID 5040 wrote to memory of 2568 5040 winver.exe 78 PID 5040 wrote to memory of 2608 5040 winver.exe 77 PID 5040 wrote to memory of 2804 5040 winver.exe 74
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\4c113be262adac7b253efc2b4ce9e93e.exe"C:\Users\Admin\AppData\Local\Temp\4c113be262adac7b253efc2b4ce9e93e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5040
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2608
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2568