Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
SideLoad1/compicer.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SideLoad1/compicer.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
SideLoad1/dllhost.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
SideLoad1/dllhost.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
SideLoad2/appinfo_local.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
SideLoad2/appinfo_local.exe
Resource
win10v2004-20231222-en
General
-
Target
SideLoad2/appinfo_local.exe
-
Size
76KB
-
MD5
d550276bb6f6ebb649c20cee526f5106
-
SHA1
9679a450e6da8198e9b15662021c2a14c0922fb0
-
SHA256
682114eab7d4f321b45c66372cdc0e48225143b11d90fa3a37e96aded89926ce
-
SHA512
0668fcb70a9c4ba8186eb5b49f151fb179431ffcc5131ed2da01590f95627c6f6db4544a7e72017dc3c89621f1398de6242862b935166269e35ce5110479d846
-
SSDEEP
1536:SD6+lo1NFOpSaOTjV1B+VjJ9ZF+xIkb63z9OIW7mXo:2K1Nfa0V10VjGIku3hOIW7/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\appinfo_local = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SideLoad2\\appinfo_local.exe" appinfo_local.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 appinfo_local.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString appinfo_local.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2732 appinfo_local.exe 2740 appinfo_local.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2740 2548 taskeng.exe 29 PID 2548 wrote to memory of 2740 2548 taskeng.exe 29 PID 2548 wrote to memory of 2740 2548 taskeng.exe 29 PID 2548 wrote to memory of 2740 2548 taskeng.exe 29 PID 2548 wrote to memory of 2740 2548 taskeng.exe 29 PID 2548 wrote to memory of 2740 2548 taskeng.exe 29 PID 2548 wrote to memory of 2740 2548 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SideLoad2\appinfo_local.exe"C:\Users\Admin\AppData\Local\Temp\SideLoad2\appinfo_local.exe"1⤵
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:2732
-
C:\Windows\system32\taskeng.exetaskeng.exe {2791D272-5C0E-4BA2-81CB-F7BB97587876} S-1-5-21-3427588347-1492276948-3422228430-1000:QVMRJQQO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\SideLoad2\appinfo_local.exeC:\Users\Admin\AppData\Local\Temp\SideLoad2\appinfo_local.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:2740
-