Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 17:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c3e75e89bed539183a64517860cf7b18.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
c3e75e89bed539183a64517860cf7b18.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c3e75e89bed539183a64517860cf7b18.exe
-
Size
129KB
-
MD5
c3e75e89bed539183a64517860cf7b18
-
SHA1
e423dc43112c99f2ef2910b88c768c6540b23994
-
SHA256
388a6597b917818d8ea61e58a8faee79e0df3ec841d694ff66833bac3d225c63
-
SHA512
2054fe089bc23de2ffd8679f7b57e2141717af5af743dee4964f3e2aeebfd091034fc63cf07763051d09c7a322a203ffdd91a731d9fe4987a27c628981c01373
-
SSDEEP
3072:ECqPrOlSM4ckJDTw0v+UpXSqCxShLijtk7sl3phkiwxBan:HqPrOlSpJ40rpmyiBphRs+
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\c3e75e89bed539183a64517860cf7b18.exe" c3e75e89bed539183a64517860cf7b18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\c3e75e89bed539183a64517860cf7b18.exe" c3e75e89bed539183a64517860cf7b18.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchosta = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c3e75e89bed539183a64517860cf7b18.exe" c3e75e89bed539183a64517860cf7b18.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 644 set thread context of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89 PID 644 wrote to memory of 4804 644 c3e75e89bed539183a64517860cf7b18.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3e75e89bed539183a64517860cf7b18.exe"C:\Users\Admin\AppData\Local\Temp\c3e75e89bed539183a64517860cf7b18.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\c3e75e89bed539183a64517860cf7b18.exeC:\Users\Admin\AppData\Local\Temp\c3e75e89bed539183a64517860cf7b18.exe2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
PID:4804
-