Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
1231.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
1231.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
1231.exe
-
Size
493KB
-
MD5
8e92c683e644b7e88184427d1b8625bb
-
SHA1
8b57d61299f7eaa32df979f54483ff72b47ba8f6
-
SHA256
9f800400f5ed4b80a6d032a437e3b7fc8fa53978854726fdfc0f2737c1237596
-
SHA512
027a5b35ef52be102fe4447be581140fc3cdbfd73d4531f1ebfab75672c84946dd9a4dd5ac144d9cf5e9b60a2890e0a975b254674d58ee24e3cbfc5282521dde
-
SSDEEP
12288:86dbSjl1WZ1oIL0WoxG3arMd9sG3SOH5:PmBMIIoWCN4Hsk7Z
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" 1231.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3064 set thread context of 2492 3064 1231.exe 40 -
Program crash 1 IoCs
pid pid_target Process procid_target 2268 2492 WerFault.exe 40 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe 3064 1231.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3064 1231.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3064 1231.exe Token: SeLoadDriverPrivilege 3064 1231.exe Token: SeDebugPrivilege 3064 1231.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2112 3064 1231.exe 31 PID 3064 wrote to memory of 2112 3064 1231.exe 31 PID 3064 wrote to memory of 2112 3064 1231.exe 31 PID 3064 wrote to memory of 2088 3064 1231.exe 32 PID 3064 wrote to memory of 2088 3064 1231.exe 32 PID 3064 wrote to memory of 2088 3064 1231.exe 32 PID 3064 wrote to memory of 2160 3064 1231.exe 33 PID 3064 wrote to memory of 2160 3064 1231.exe 33 PID 3064 wrote to memory of 2160 3064 1231.exe 33 PID 3064 wrote to memory of 2316 3064 1231.exe 34 PID 3064 wrote to memory of 2316 3064 1231.exe 34 PID 3064 wrote to memory of 2316 3064 1231.exe 34 PID 3064 wrote to memory of 2332 3064 1231.exe 35 PID 3064 wrote to memory of 2332 3064 1231.exe 35 PID 3064 wrote to memory of 2332 3064 1231.exe 35 PID 3064 wrote to memory of 1516 3064 1231.exe 36 PID 3064 wrote to memory of 1516 3064 1231.exe 36 PID 3064 wrote to memory of 1516 3064 1231.exe 36 PID 3064 wrote to memory of 2340 3064 1231.exe 37 PID 3064 wrote to memory of 2340 3064 1231.exe 37 PID 3064 wrote to memory of 2340 3064 1231.exe 37 PID 3064 wrote to memory of 2852 3064 1231.exe 38 PID 3064 wrote to memory of 2852 3064 1231.exe 38 PID 3064 wrote to memory of 2852 3064 1231.exe 38 PID 3064 wrote to memory of 1300 3064 1231.exe 39 PID 3064 wrote to memory of 1300 3064 1231.exe 39 PID 3064 wrote to memory of 1300 3064 1231.exe 39 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 3064 wrote to memory of 2492 3064 1231.exe 40 PID 2492 wrote to memory of 2268 2492 Setup.exe 41 PID 2492 wrote to memory of 2268 2492 Setup.exe 41 PID 2492 wrote to memory of 2268 2492 Setup.exe 41 PID 2492 wrote to memory of 2268 2492 Setup.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\1231.exe"C:\Users\Admin\AppData\Local\Temp\1231.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:2112
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:2088
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:2160
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:2316
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:2332
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:1516
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:2340
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"2⤵PID:2852
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:1300
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\Setup.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\Setup.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 3003⤵
- Program crash
PID:2268
-
-