Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 00:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7350622fc8ceb587cf01ca055d81874d.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
7350622fc8ceb587cf01ca055d81874d.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
7350622fc8ceb587cf01ca055d81874d.exe
-
Size
600KB
-
MD5
7350622fc8ceb587cf01ca055d81874d
-
SHA1
1b7017c4e4325bd4d01570a14ae1d06c5685b3eb
-
SHA256
2729f57d011b73c4cb6964ab3ce3433f820f5c7ee287032c3070640edcaa0fbf
-
SHA512
15b47c227ad5e4b6f8c8255091974421f5a3531687b76a311ed5e3472462da3f2e41bc2cd355997c749cdb3cf808bccbfff81be0bb809c9ed87fbbd1696f7abf
-
SSDEEP
12288:8oLDniit67XLIulF/me3THMCKQW8I473C6h2:5ii4XLIulF+e3TsrQfI47/2
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ISE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7350622fc8ceb587cf01ca055d81874d.exe /cs:1 " 7350622fc8ceb587cf01ca055d81874d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\ISE = "\"C:\\ProgramData\\72a2d5\\IS72a_7.exe\" /s" 7350622fc8ceb587cf01ca055d81874d.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Eset\Nod\ 7350622fc8ceb587cf01ca055d81874d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1160 set thread context of 1960 1160 7350622fc8ceb587cf01ca055d81874d.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2736 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2736 taskkill.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1960 1160 7350622fc8ceb587cf01ca055d81874d.exe 28 PID 1160 wrote to memory of 1960 1160 7350622fc8ceb587cf01ca055d81874d.exe 28 PID 1160 wrote to memory of 1960 1160 7350622fc8ceb587cf01ca055d81874d.exe 28 PID 1160 wrote to memory of 1960 1160 7350622fc8ceb587cf01ca055d81874d.exe 28 PID 1160 wrote to memory of 1960 1160 7350622fc8ceb587cf01ca055d81874d.exe 28 PID 1160 wrote to memory of 1960 1160 7350622fc8ceb587cf01ca055d81874d.exe 28 PID 1960 wrote to memory of 2736 1960 7350622fc8ceb587cf01ca055d81874d.exe 29 PID 1960 wrote to memory of 2736 1960 7350622fc8ceb587cf01ca055d81874d.exe 29 PID 1960 wrote to memory of 2736 1960 7350622fc8ceb587cf01ca055d81874d.exe 29 PID 1960 wrote to memory of 2736 1960 7350622fc8ceb587cf01ca055d81874d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7350622fc8ceb587cf01ca055d81874d.exe"C:\Users\Admin\AppData\Local\Temp\7350622fc8ceb587cf01ca055d81874d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\7350622fc8ceb587cf01ca055d81874d.exe"C:\Users\Admin\AppData\Local\Temp\7350622fc8ceb587cf01ca055d81874d.exe" "C:\Users\Admin\AppData\Local\Temp\7350622fc8ceb587cf01ca055d81874d.exe"2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /F /IM MSASCui* /IM avg* /IM ash* /IM McSA* /IM msse*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-