Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 19:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
783c11b4d2ea43e7f1e02b4658945276.exe
Resource
win7-20231129-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
783c11b4d2ea43e7f1e02b4658945276.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
783c11b4d2ea43e7f1e02b4658945276.exe
-
Size
180KB
-
MD5
783c11b4d2ea43e7f1e02b4658945276
-
SHA1
7588782943660bfdad705338981f1b6821f0c085
-
SHA256
63eee8f8decb3dc7d151b7dc05b72ce34da1d259033a3c9ceb7a7919dffa389b
-
SHA512
5ce4c89163b427f54187789e37ebe0a33ed52f24495309b4e0b148e0a3b905f834c1449c88ba8a30f7bef040b00581ea1108658373906930d4d2038602915753
-
SSDEEP
3072:6B2/wff+3RsAsIluMxBzYxv9hmw0I9CXcMBZrfwpC5:6ao+3RdLvYxlhBEBZrfwpC
Score
8/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run 783c11b4d2ea43e7f1e02b4658945276.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\RQWLM40HC0IV = "C:\\Users\\Admin\\AppData\\Roaming\\WE2VSZQX.exe" 783c11b4d2ea43e7f1e02b4658945276.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 783c11b4d2ea43e7f1e02b4658945276.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\RQWLM40HC0IV = "C:\\Users\\Admin\\AppData\\Roaming\\WE2VSZQX.exe" 783c11b4d2ea43e7f1e02b4658945276.exe -
resource yara_rule behavioral1/memory/1152-23-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1152-20-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1152-19-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1152-27-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1152-29-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1152-30-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1152-33-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RQWLM40HC0IV = "C:\\Users\\Admin\\AppData\\Roaming\\WE2VSZQX.exe" 783c11b4d2ea43e7f1e02b4658945276.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\RQWLM40HC0IV = "C:\\Users\\Admin\\AppData\\Roaming\\WE2VSZQX.exe" 783c11b4d2ea43e7f1e02b4658945276.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 783c11b4d2ea43e7f1e02b4658945276.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 944 set thread context of 956 944 783c11b4d2ea43e7f1e02b4658945276.exe 28 PID 956 set thread context of 1152 956 783c11b4d2ea43e7f1e02b4658945276.exe 29 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1152 783c11b4d2ea43e7f1e02b4658945276.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 944 783c11b4d2ea43e7f1e02b4658945276.exe 956 783c11b4d2ea43e7f1e02b4658945276.exe 1152 783c11b4d2ea43e7f1e02b4658945276.exe 1152 783c11b4d2ea43e7f1e02b4658945276.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 944 wrote to memory of 956 944 783c11b4d2ea43e7f1e02b4658945276.exe 28 PID 944 wrote to memory of 956 944 783c11b4d2ea43e7f1e02b4658945276.exe 28 PID 944 wrote to memory of 956 944 783c11b4d2ea43e7f1e02b4658945276.exe 28 PID 944 wrote to memory of 956 944 783c11b4d2ea43e7f1e02b4658945276.exe 28 PID 944 wrote to memory of 956 944 783c11b4d2ea43e7f1e02b4658945276.exe 28 PID 944 wrote to memory of 956 944 783c11b4d2ea43e7f1e02b4658945276.exe 28 PID 944 wrote to memory of 956 944 783c11b4d2ea43e7f1e02b4658945276.exe 28 PID 944 wrote to memory of 956 944 783c11b4d2ea43e7f1e02b4658945276.exe 28 PID 944 wrote to memory of 956 944 783c11b4d2ea43e7f1e02b4658945276.exe 28 PID 956 wrote to memory of 1152 956 783c11b4d2ea43e7f1e02b4658945276.exe 29 PID 956 wrote to memory of 1152 956 783c11b4d2ea43e7f1e02b4658945276.exe 29 PID 956 wrote to memory of 1152 956 783c11b4d2ea43e7f1e02b4658945276.exe 29 PID 956 wrote to memory of 1152 956 783c11b4d2ea43e7f1e02b4658945276.exe 29 PID 956 wrote to memory of 1152 956 783c11b4d2ea43e7f1e02b4658945276.exe 29 PID 956 wrote to memory of 1152 956 783c11b4d2ea43e7f1e02b4658945276.exe 29 PID 956 wrote to memory of 1152 956 783c11b4d2ea43e7f1e02b4658945276.exe 29 PID 956 wrote to memory of 1152 956 783c11b4d2ea43e7f1e02b4658945276.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\783c11b4d2ea43e7f1e02b4658945276.exe"C:\Users\Admin\AppData\Local\Temp\783c11b4d2ea43e7f1e02b4658945276.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\783c11b4d2ea43e7f1e02b4658945276.exe"C:\Users\Admin\AppData\Local\Temp\783c11b4d2ea43e7f1e02b4658945276.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\783c11b4d2ea43e7f1e02b4658945276.exe"C:\Users\Admin\AppData\Local\Temp\783c11b4d2ea43e7f1e02b4658945276.exe"3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1152
-
-