Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe
Resource
win10v2004-20240508-en
General
-
Target
085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe
-
Size
1.1MB
-
MD5
185bfc658c12575237d1a970aedf59dc
-
SHA1
e1e2350fc01c3a5fa936c04c16bb3ce6145592f0
-
SHA256
085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1
-
SHA512
ec45e14716580c30c1dfb78f62a221ac9dfc84f61777a966ff600616ab0d00f3da210608c25cb257fa7e44f3010711cc64ee577ee49e7284ef9f5ac189fc3e01
-
SSDEEP
24576:4f25o/ty5xQYr2+unJ3BpAFN/gCaI/jWjk:4JeM3M9Z/jWjk
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3212 set thread context of 3384 3212 colorcpl.exe 56 PID 3212 set thread context of 2476 3212 colorcpl.exe 107 PID 2476 set thread context of 3384 2476 RMActivate_ssp.exe 56 PID 2476 set thread context of 5296 2476 RMActivate_ssp.exe 116 -
description ioc Process Key created \Registry\User\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 RMActivate_ssp.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 32 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 36 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 5780 085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe 5780 085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 3212 colorcpl.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3212 colorcpl.exe 3212 colorcpl.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe 2476 RMActivate_ssp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3384 Explorer.EXE Token: SeCreatePagefilePrivilege 3384 Explorer.EXE Token: SeShutdownPrivilege 3384 Explorer.EXE Token: SeCreatePagefilePrivilege 3384 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5780 wrote to memory of 3212 5780 085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe 101 PID 5780 wrote to memory of 3212 5780 085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe 101 PID 5780 wrote to memory of 3212 5780 085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe 101 PID 5780 wrote to memory of 3212 5780 085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe 101 PID 3212 wrote to memory of 2476 3212 colorcpl.exe 107 PID 3212 wrote to memory of 2476 3212 colorcpl.exe 107 PID 3212 wrote to memory of 2476 3212 colorcpl.exe 107 PID 2476 wrote to memory of 5296 2476 RMActivate_ssp.exe 116 PID 2476 wrote to memory of 5296 2476 RMActivate_ssp.exe 116
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe"C:\Users\Admin\AppData\Local\Temp\085d42dd20ffe5f9725a1d0197bc44f40e9750e0996f189f0d74f70a4e7482a1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5780 -
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\RMActivate_ssp.exe"C:\Windows\SysWOW64\RMActivate_ssp.exe"4⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"5⤵PID:5296
-
-
-
-