Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
70c81a886cca574b5bfee01dbdb8dcc9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70c81a886cca574b5bfee01dbdb8dcc9.exe
Resource
win10v2004-20231215-en
General
-
Target
70c81a886cca574b5bfee01dbdb8dcc9.exe
-
Size
35KB
-
MD5
70c81a886cca574b5bfee01dbdb8dcc9
-
SHA1
dd7f3e6a038e6415d74e7cd221dc11f21d7b8f62
-
SHA256
62b5f3d0161b7b936b55277e6676a10e21c9f6037c98cb4206316976f36fca99
-
SHA512
cfd1a52df06bb8192ebd703f1f315029b94b59eb32372127b98ea72c5c8793390404c8e85a051acfe5280f3608a154342cf224acb383cb5e2fa9fc1f2e2dae3b
-
SSDEEP
768:J6LiRTtlquXp7pPPuWJknGi0mJcWZSPh1nQMXYKj:ULoTauX9hPuNPPcWoPDnQMXLj
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1568 set thread context of 2240 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 29 -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2244 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 28 PID 1568 wrote to memory of 2244 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 28 PID 1568 wrote to memory of 2244 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 28 PID 1568 wrote to memory of 2244 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 28 PID 1568 wrote to memory of 2240 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 29 PID 1568 wrote to memory of 2240 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 29 PID 1568 wrote to memory of 2240 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 29 PID 1568 wrote to memory of 2240 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 29 PID 1568 wrote to memory of 2240 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 29 PID 1568 wrote to memory of 2240 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 29 PID 1568 wrote to memory of 2240 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 29 PID 1568 wrote to memory of 2240 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 29 PID 1568 wrote to memory of 2240 1568 70c81a886cca574b5bfee01dbdb8dcc9.exe 29 PID 2244 wrote to memory of 2228 2244 explorer.exe 31 PID 2244 wrote to memory of 2228 2244 explorer.exe 31 PID 2244 wrote to memory of 2228 2244 explorer.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\70c81a886cca574b5bfee01dbdb8dcc9.exe"C:\Users\Admin\AppData\Local\Temp\70c81a886cca574b5bfee01dbdb8dcc9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2228
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default tamaz.duckdns.org 1983 fCOELqyzG2⤵PID:2240
-