Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-03-2024 13:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d0f8548b0b062faae09c74004e1155d6.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
d0f8548b0b062faae09c74004e1155d6.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
d0f8548b0b062faae09c74004e1155d6.exe
-
Size
356KB
-
MD5
d0f8548b0b062faae09c74004e1155d6
-
SHA1
dab7b56c182663899370f767cac266cb48ec19b3
-
SHA256
8b39f5c3e8d6a40e7ac61b75a3ff9a23e14c6075d7a906635723a51bcf405788
-
SHA512
e371ed23552bd26799483a1158dba047f7039f6f5ffdf7694da7f8a41acc0be732ce127b6c5022c7beb1b8e158b799b0b376eafbd54e219dd08ee052115efa67
-
SSDEEP
6144:o9VnIoCin4yVsaBQyP8PdrKF4OBl39qDJbRdTA/HgUGjUWnLFK:erlTVTiyP8PdrKF4OBdADtTx9jUqk
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
Processes:
d0f8548b0b062faae09c74004e1155d6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
d0f8548b0b062faae09c74004e1155d6.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d0f8548b0b062faae09c74004e1155d6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
d0f8548b0b062faae09c74004e1155d6.exed0f8548b0b062faae09c74004e1155d6.exedescription pid process target process PID 2740 set thread context of 1624 2740 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1624 set thread context of 2424 1624 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
d0f8548b0b062faae09c74004e1155d6.exed0f8548b0b062faae09c74004e1155d6.exedescription pid process target process PID 2740 wrote to memory of 1624 2740 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 2740 wrote to memory of 1624 2740 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 2740 wrote to memory of 1624 2740 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 2740 wrote to memory of 1624 2740 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 2740 wrote to memory of 1624 2740 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 2740 wrote to memory of 1624 2740 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 2740 wrote to memory of 1624 2740 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 2740 wrote to memory of 1624 2740 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 2740 wrote to memory of 1624 2740 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1624 wrote to memory of 2424 1624 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1624 wrote to memory of 2424 1624 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1624 wrote to memory of 2424 1624 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1624 wrote to memory of 2424 1624 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1624 wrote to memory of 2424 1624 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1624 wrote to memory of 2424 1624 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1624 wrote to memory of 2424 1624 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1624 wrote to memory of 2424 1624 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0f8548b0b062faae09c74004e1155d6.exe"C:\Users\Admin\AppData\Local\Temp\d0f8548b0b062faae09c74004e1155d6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\d0f8548b0b062faae09c74004e1155d6.exe"C:\Users\Admin\AppData\Local\Temp\d0f8548b0b062faae09c74004e1155d6.exe"2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\d0f8548b0b062faae09c74004e1155d6.exeminer.exe -a 60 -g yes -o http://ze.pusikuracbre.com:8332/ -u redem_check -p magicguildd3⤵PID:2424
-
-