Analysis
-
max time kernel
75s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 03:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
przv3.exe
Resource
win7-20240508-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
przv3.exe
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
przv3.exe
-
Size
17.8MB
-
MD5
d6f73cc1d510e743a10d7810c20af810
-
SHA1
62fb77628f2d066d98c7656e0b84499ce9b9da94
-
SHA256
7e791afb9e4818496373828afa76df01fe6a77075b9a94095c54aca5fb24b2ac
-
SHA512
c10122b3a6e152ba2cf20c6b1220289957b5c8442b183e34da61381c6976670652a35eb54c08536469380ddedf932f54c38fca519425f7c9c92b9bf7528e90bd
-
SSDEEP
393216:oZA1UlLze3AvfDwCCpjNmXhqMnOQCRkDr3X+u06rSP+:8AulHe3A3DwCCQlOQ4kDjO96rSP
Score
8/10
Malware Config
Signatures
-
Manipulates Digital Signatures 1 TTPs 3 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7\Name = "szOID_ROOT_PROGRAM_NO_OCSP_FAILOVER_TO_CRL" certutil.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4700 przv3.exe 4700 przv3.exe 2480 przv3.exe 2480 przv3.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 560 4700 WerFault.exe 80 228 2480 WerFault.exe 110 -
Delays execution with timeout.exe 2 IoCs
pid Process 2592 timeout.exe 3740 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4700 przv3.exe 4700 przv3.exe 2480 przv3.exe 2480 przv3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2480 przv3.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4700 wrote to memory of 1552 4700 przv3.exe 83 PID 4700 wrote to memory of 1552 4700 przv3.exe 83 PID 4700 wrote to memory of 1552 4700 przv3.exe 83 PID 1552 wrote to memory of 3488 1552 cmd.exe 84 PID 1552 wrote to memory of 3488 1552 cmd.exe 84 PID 1552 wrote to memory of 3488 1552 cmd.exe 84 PID 1552 wrote to memory of 452 1552 cmd.exe 85 PID 1552 wrote to memory of 452 1552 cmd.exe 85 PID 1552 wrote to memory of 452 1552 cmd.exe 85 PID 1552 wrote to memory of 2496 1552 cmd.exe 86 PID 1552 wrote to memory of 2496 1552 cmd.exe 86 PID 1552 wrote to memory of 2496 1552 cmd.exe 86 PID 4700 wrote to memory of 4584 4700 przv3.exe 91 PID 4700 wrote to memory of 4584 4700 przv3.exe 91 PID 4700 wrote to memory of 4584 4700 przv3.exe 91 PID 4584 wrote to memory of 4624 4584 cmd.exe 92 PID 4584 wrote to memory of 4624 4584 cmd.exe 92 PID 4584 wrote to memory of 4624 4584 cmd.exe 92 PID 4624 wrote to memory of 2592 4624 cmd.exe 96 PID 4624 wrote to memory of 2592 4624 cmd.exe 96 PID 4624 wrote to memory of 2592 4624 cmd.exe 96 PID 2480 wrote to memory of 4396 2480 przv3.exe 113 PID 2480 wrote to memory of 4396 2480 przv3.exe 113 PID 2480 wrote to memory of 4396 2480 przv3.exe 113 PID 4396 wrote to memory of 1164 4396 cmd.exe 114 PID 4396 wrote to memory of 1164 4396 cmd.exe 114 PID 4396 wrote to memory of 1164 4396 cmd.exe 114 PID 4396 wrote to memory of 4628 4396 cmd.exe 115 PID 4396 wrote to memory of 4628 4396 cmd.exe 115 PID 4396 wrote to memory of 4628 4396 cmd.exe 115 PID 4396 wrote to memory of 3224 4396 cmd.exe 116 PID 4396 wrote to memory of 3224 4396 cmd.exe 116 PID 4396 wrote to memory of 3224 4396 cmd.exe 116 PID 2480 wrote to memory of 812 2480 przv3.exe 117 PID 2480 wrote to memory of 812 2480 przv3.exe 117 PID 2480 wrote to memory of 812 2480 przv3.exe 117 PID 812 wrote to memory of 4972 812 cmd.exe 118 PID 812 wrote to memory of 4972 812 cmd.exe 118 PID 812 wrote to memory of 4972 812 cmd.exe 118 PID 4972 wrote to memory of 3740 4972 cmd.exe 122 PID 4972 wrote to memory of 3740 4972 cmd.exe 122 PID 4972 wrote to memory of 3740 4972 cmd.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\przv3.exe"C:\Users\Admin\AppData\Local\Temp\przv3.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\przv3.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\przv3.exe" MD53⤵
- Manipulates Digital Signatures
PID:3488
-
-
C:\Windows\SysWOW64\find.exefind /i /v "md5"3⤵PID:452
-
-
C:\Windows\SysWOW64\find.exefind /i /v "certutil"3⤵PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo Couldn't resolve host name && timeout /t 5"2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\cmd.execmd /C "color b && title Error && echo Couldn't resolve host name && timeout /t 5"3⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:2592
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 12282⤵
- Program crash
PID:560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4700 -ip 47001⤵PID:4868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\przv3.exe"C:\Users\Admin\AppData\Local\Temp\przv3.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\przv3.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\przv3.exe" MD53⤵PID:1164
-
-
C:\Windows\SysWOW64\find.exefind /i /v "md5"3⤵PID:4628
-
-
C:\Windows\SysWOW64\find.exefind /i /v "certutil"3⤵PID:3224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo Couldn't resolve host name && timeout /t 5"2⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\cmd.execmd /C "color b && title Error && echo Couldn't resolve host name && timeout /t 5"3⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:3740
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 11482⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2480 -ip 24801⤵PID:5040