Analysis
-
max time kernel
161s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 00:47
Behavioral task
behavioral1
Sample
22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe
Resource
win10v2004-20240704-en
General
-
Target
22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe
-
Size
45KB
-
MD5
20e7e84ffe49f34407c2f114bdc4fc50
-
SHA1
e587a55f005e6202ddd066c0fe607c2204a4cfac
-
SHA256
22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237
-
SHA512
847097e24f752c8db524dafd9a55b126d6b8b77cb8309160935bb7b33eb89da563f3cc838fe89fb5960c0facd2e1f0b749b4813e8d7fd1cc7e7c68186d3a321b
-
SSDEEP
768:phP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:zsWE9N5dFu53dsniQaB/xZ14n7zIF+qr
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2224-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\1F0BB8C6 = "C:\\Users\\Admin\\AppData\\Roaming\\1F0BB8C6\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe 2264 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2264 2224 22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe 30 PID 2224 wrote to memory of 2264 2224 22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe 30 PID 2224 wrote to memory of 2264 2224 22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe 30 PID 2224 wrote to memory of 2264 2224 22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe 30 PID 2224 wrote to memory of 2264 2224 22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe 30 PID 2264 wrote to memory of 1252 2264 winver.exe 20 PID 2264 wrote to memory of 1116 2264 winver.exe 18 PID 2264 wrote to memory of 1204 2264 winver.exe 19 PID 2264 wrote to memory of 1252 2264 winver.exe 20 PID 2264 wrote to memory of 932 2264 winver.exe 24
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1204
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe"C:\Users\Admin\AppData\Local\Temp\22a4ab9eecf218b7f55460a2ea563f633f1bc6927ef3e5d3b6f9f652dd069237.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2264
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:932