Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2024 13:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d0f8548b0b062faae09c74004e1155d6.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
d0f8548b0b062faae09c74004e1155d6.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
d0f8548b0b062faae09c74004e1155d6.exe
-
Size
356KB
-
MD5
d0f8548b0b062faae09c74004e1155d6
-
SHA1
dab7b56c182663899370f767cac266cb48ec19b3
-
SHA256
8b39f5c3e8d6a40e7ac61b75a3ff9a23e14c6075d7a906635723a51bcf405788
-
SHA512
e371ed23552bd26799483a1158dba047f7039f6f5ffdf7694da7f8a41acc0be732ce127b6c5022c7beb1b8e158b799b0b376eafbd54e219dd08ee052115efa67
-
SSDEEP
6144:o9VnIoCin4yVsaBQyP8PdrKF4OBl39qDJbRdTA/HgUGjUWnLFK:erlTVTiyP8PdrKF4OBdADtTx9jUqk
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
Processes:
d0f8548b0b062faae09c74004e1155d6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
d0f8548b0b062faae09c74004e1155d6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d0f8548b0b062faae09c74004e1155d6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Windows Task Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d0f8548b0b062faae09c74004e1155d6.exe" d0f8548b0b062faae09c74004e1155d6.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
d0f8548b0b062faae09c74004e1155d6.exed0f8548b0b062faae09c74004e1155d6.exedescription pid process target process PID 1776 set thread context of 4856 1776 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 4856 set thread context of 2812 4856 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
d0f8548b0b062faae09c74004e1155d6.exed0f8548b0b062faae09c74004e1155d6.exedescription pid process target process PID 1776 wrote to memory of 4856 1776 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1776 wrote to memory of 4856 1776 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1776 wrote to memory of 4856 1776 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1776 wrote to memory of 4856 1776 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1776 wrote to memory of 4856 1776 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1776 wrote to memory of 4856 1776 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1776 wrote to memory of 4856 1776 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 1776 wrote to memory of 4856 1776 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 4856 wrote to memory of 2812 4856 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 4856 wrote to memory of 2812 4856 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 4856 wrote to memory of 2812 4856 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 4856 wrote to memory of 2812 4856 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 4856 wrote to memory of 2812 4856 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 4856 wrote to memory of 2812 4856 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe PID 4856 wrote to memory of 2812 4856 d0f8548b0b062faae09c74004e1155d6.exe d0f8548b0b062faae09c74004e1155d6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0f8548b0b062faae09c74004e1155d6.exe"C:\Users\Admin\AppData\Local\Temp\d0f8548b0b062faae09c74004e1155d6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\d0f8548b0b062faae09c74004e1155d6.exe"C:\Users\Admin\AppData\Local\Temp\d0f8548b0b062faae09c74004e1155d6.exe"2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\d0f8548b0b062faae09c74004e1155d6.exeminer.exe -a 60 -g yes -o http://ze.pusikuracbre.com:8332/ -u redem_check -p magicguildd3⤵PID:2812
-
-