Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe
Resource
win10v2004-20240508-en
General
-
Target
a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe
-
Size
1.2MB
-
MD5
cb04e4165970dbd63faf5741f0029684
-
SHA1
078fd9a302c529336f8abea032eb3b5c4f911242
-
SHA256
a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef
-
SHA512
65c0b0fdb31067cb1501f49f5da7d66a71bdbb0936c857347ab826e2692035435ccd2cac33998b18b5931e0dcd937e8c2a80bb61b24d816c39e75b2354f8c9bd
-
SSDEEP
24576:YAHnh+eWsN3skA4RV1Hom2KXMmHaQ7gmDCeBxWTdlRIz5:fh+ZkldoPK8YaIgmHLWTvK
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exesvchost.exewhoami.exedescription pid process target process PID 1648 set thread context of 2216 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe svchost.exe PID 2216 set thread context of 1204 2216 svchost.exe Explorer.EXE PID 2216 set thread context of 2820 2216 svchost.exe whoami.exe PID 2820 set thread context of 1204 2820 whoami.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
svchost.exewhoami.exepid process 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe 2820 whoami.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exesvchost.exeExplorer.EXEwhoami.exepid process 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe 2216 svchost.exe 1204 Explorer.EXE 1204 Explorer.EXE 2820 whoami.exe 2820 whoami.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exeExplorer.EXEpid process 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exepid process 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exeExplorer.EXEdescription pid process target process PID 1648 wrote to memory of 2216 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe svchost.exe PID 1648 wrote to memory of 2216 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe svchost.exe PID 1648 wrote to memory of 2216 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe svchost.exe PID 1648 wrote to memory of 2216 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe svchost.exe PID 1648 wrote to memory of 2216 1648 a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe svchost.exe PID 1204 wrote to memory of 2820 1204 Explorer.EXE whoami.exe PID 1204 wrote to memory of 2820 1204 Explorer.EXE whoami.exe PID 1204 wrote to memory of 2820 1204 Explorer.EXE whoami.exe PID 1204 wrote to memory of 2820 1204 Explorer.EXE whoami.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe"C:\Users\Admin\AppData\Local\Temp\a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a505c17117d77b38d502a1386392c94ed32d559819a5106de1bda80516d976ef.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\SysWOW64\whoami.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\maneuverabilityFilesize
268KB
MD5b108d89a92c27349d5f10c5c85371940
SHA18ebdbe3f9b47aca1df1dac9b45038740bacdd4e8
SHA256c155ed4f0f7ad8eb0ededb57b0c88113ba5bb11d22274d46d8cc16db136a6be0
SHA51295b1164c67d38f7e645fd2e39fcf948967ee3d2f2a9f2fd384eb86a3079d05a079c001b44c6c8198217e780e67779e7d1314ac1ff07f910163ee993b1c750bb2
-
memory/1204-29-0x00000000090C0000-0x000000000A03C000-memory.dmpFilesize
15.5MB
-
memory/1204-20-0x00000000090C0000-0x000000000A03C000-memory.dmpFilesize
15.5MB
-
memory/1204-18-0x0000000003B70000-0x0000000003C70000-memory.dmpFilesize
1024KB
-
memory/1648-11-0x00000000001A0000-0x00000000001A4000-memory.dmpFilesize
16KB
-
memory/2216-15-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/2216-24-0x00000000001E0000-0x0000000000202000-memory.dmpFilesize
136KB
-
memory/2216-17-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/2216-19-0x00000000001E0000-0x0000000000202000-memory.dmpFilesize
136KB
-
memory/2216-14-0x0000000000790000-0x0000000000A93000-memory.dmpFilesize
3.0MB
-
memory/2216-13-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/2216-12-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/2216-16-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/2216-23-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/2820-22-0x00000000000D0000-0x0000000000110000-memory.dmpFilesize
256KB
-
memory/2820-25-0x0000000001FA0000-0x00000000022A3000-memory.dmpFilesize
3.0MB
-
memory/2820-26-0x00000000000D0000-0x0000000000110000-memory.dmpFilesize
256KB
-
memory/2820-28-0x0000000001BE0000-0x0000000001C81000-memory.dmpFilesize
644KB
-
memory/2820-21-0x00000000000D0000-0x0000000000110000-memory.dmpFilesize
256KB
-
memory/2820-30-0x00000000000D0000-0x0000000000110000-memory.dmpFilesize
256KB