Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
AWB_NO_907853880911.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
AWB_NO_907853880911.exe
-
Size
743KB
-
MD5
2685c5b3d73fe94a815a84c1dd5813ef
-
SHA1
edf893ff59c3437e942fd8cd40c9381ef536dbf2
-
SHA256
27769f4bb96d0e605bdc282658c6a729e4ceb8447cd9e1f9880c69862258e66f
-
SHA512
a989d2198b0a9d8bddff535bd821c124b347cbdb0a2ffb91ce76b9d91a4847e38ffd2a58300e53366004628729d5ac9d9dfc10539ae6808ab6c3d26877e6fc65
-
SSDEEP
12288:X4nWcI58atfrHsfjGrfrtofP/l1rkxNVOIiB3bow5404ni0C0eb:X4Y5JDsfjStMn3rkxNo+w5/4+0
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4720 set thread context of 2648 4720 AWB_NO_907853880911.exe 95 PID 2648 set thread context of 3284 2648 AWB_NO_907853880911.exe 81 PID 2648 set thread context of 4188 2648 AWB_NO_907853880911.exe 97 PID 4188 set thread context of 3284 4188 dvdplay.exe 81 -
description ioc Process Key created \Registry\User\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 dvdplay.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4720 AWB_NO_907853880911.exe 4720 AWB_NO_907853880911.exe 4720 AWB_NO_907853880911.exe 4720 AWB_NO_907853880911.exe 4720 AWB_NO_907853880911.exe 4720 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 2648 AWB_NO_907853880911.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2648 AWB_NO_907853880911.exe 3284 Explorer.EXE 3284 Explorer.EXE 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe 4188 dvdplay.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4720 AWB_NO_907853880911.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3284 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4720 wrote to memory of 2648 4720 AWB_NO_907853880911.exe 95 PID 4720 wrote to memory of 2648 4720 AWB_NO_907853880911.exe 95 PID 4720 wrote to memory of 2648 4720 AWB_NO_907853880911.exe 95 PID 4720 wrote to memory of 2648 4720 AWB_NO_907853880911.exe 95 PID 4720 wrote to memory of 2648 4720 AWB_NO_907853880911.exe 95 PID 4720 wrote to memory of 2648 4720 AWB_NO_907853880911.exe 95 PID 3284 wrote to memory of 4188 3284 Explorer.EXE 97 PID 3284 wrote to memory of 4188 3284 Explorer.EXE 97 PID 3284 wrote to memory of 4188 3284 Explorer.EXE 97 PID 4188 wrote to memory of 3044 4188 dvdplay.exe 98 PID 4188 wrote to memory of 3044 4188 dvdplay.exe 98 PID 4188 wrote to memory of 3044 4188 dvdplay.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\AWB_NO_907853880911.exe"C:\Users\Admin\AppData\Local\Temp\AWB_NO_907853880911.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\AWB_NO_907853880911.exe"C:\Users\Admin\AppData\Local\Temp\AWB_NO_907853880911.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2648
-
-
-
C:\Windows\SysWOW64\dvdplay.exe"C:\Windows\SysWOW64\dvdplay.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3044
-
-