Resubmissions
25-04-2024 12:39
240425-pv285aag93 8Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 12:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
76fonpc.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
76fonpc.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
76fonpc.exe
-
Size
1.3MB
-
MD5
240fcb4aa34850b8f8b79fc92f1e2fef
-
SHA1
76c6b8efc1601f5ae835864cd82874019fec11f8
-
SHA256
5734abc72e2a80574600c73f98ddcb11d69f0bc28311d1d1b603cde277068fed
-
SHA512
ab3e20857ab9fa75583c15f8a27e69cdf9328d2539fae3984c1202692db0ff93418c76fd9277c868b8d469770fe68ff574c8803f8061f87c7924d9459054e7f5
-
SSDEEP
24576:yztTHTQ9VLfwGIICI4kdVPF6QZ8hKhzZc06WogeOf:yztr09VLfaI/ldVPQQZ8KFoR2
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" 76fonpc.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1556 76fonpc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1556 76fonpc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1556 wrote to memory of 2204 1556 76fonpc.exe 29 PID 1556 wrote to memory of 2204 1556 76fonpc.exe 29 PID 1556 wrote to memory of 2204 1556 76fonpc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\76fonpc.exe"C:\Users\Admin\AppData\Local\Temp\76fonpc.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1556 -s 1122⤵PID:2204
-