Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe
Resource
win10v2004-20240419-en
General
-
Target
8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe
-
Size
1.2MB
-
MD5
2b5917ada9ef1cef3713977421874f68
-
SHA1
fb74e9a12166950199edc891c59bea4069edcd1c
-
SHA256
8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6
-
SHA512
1e2c1cab61d86da2d4354a771a4eebb5221c47c09581e499d1e20211ca2e63a900992d829161b77d3231b7e09122411dfa195bf35cf82cf68d94490c9cab6008
-
SSDEEP
24576:jqDEvCTbMWu7rQYlBQcBiT6rprG8a/J0EhYslvrhI6cI:jTvC/MTQYxsWR7a/J0Eas9Iz
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2200 set thread context of 1752 2200 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 87 PID 1752 set thread context of 3468 1752 svchost.exe 56 PID 1752 set thread context of 2360 1752 svchost.exe 100 PID 2360 set thread context of 3468 2360 finger.exe 56 -
description ioc Process Key created \Registry\User\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 finger.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 1752 svchost.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2200 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 1752 svchost.exe 3468 Explorer.EXE 3468 Explorer.EXE 2360 finger.exe 2360 finger.exe 2360 finger.exe 2360 finger.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3468 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1752 2200 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 87 PID 2200 wrote to memory of 1752 2200 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 87 PID 2200 wrote to memory of 1752 2200 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 87 PID 2200 wrote to memory of 1752 2200 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 87 PID 3468 wrote to memory of 2360 3468 Explorer.EXE 100 PID 3468 wrote to memory of 2360 3468 Explorer.EXE 100 PID 3468 wrote to memory of 2360 3468 Explorer.EXE 100 PID 2360 wrote to memory of 920 2360 finger.exe 113 PID 2360 wrote to memory of 920 2360 finger.exe 113 PID 2360 wrote to memory of 920 2360 finger.exe 113
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe"C:\Users\Admin\AppData\Local\Temp\8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1752
-
-
-
C:\Windows\SysWOW64\finger.exe"C:\Windows\SysWOW64\finger.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD501cbc578c30426a9213885b2c7976328
SHA16cf0e0935f3464b676b308a0c4bbeb06d8eb2f4c
SHA2568d208a375a96923985a66f18d0a6d646064851528b707f75e38128c1b66e6e46
SHA5120cebf7f1d711a0b766cff83995ededde42bc2b8d4543ba890f603c01ca962a61d538b2f28bdaa85c032780ed875deee85ccd39870cc17e72a5199b273f98b573