Analysis
-
max time kernel
166s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe
Resource
win10v2004-20220812-en
General
-
Target
c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe
-
Size
564KB
-
MD5
c5d675abb9b6b8e3f57dd1dbe10d7e2b
-
SHA1
dbe4c34debdea121ea3d8f2b19982e6d91fa1274
-
SHA256
c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390
-
SHA512
bf7862409d97b0b13dd7f467a1d226d070d99cdc994e2357d7cee6264e4df9f37761bd59f5287ea89ac13cdeee5b7107740964de0b762cfcaf7534b08a9f2f31
-
SSDEEP
12288:d7u1PDRCNZzCLzUTLpI+FolTgZEnkO3ySRjcSbB:dK/CTAYPWlTg/0gSV
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390 = "c:\\WINDOWS\\Yahoo!Messenger.exe" c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\Yahoo! Messenger.exe c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe File created C:\WINDOWS\Yahoo! Messenger.exe c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2000 c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2000 c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe"C:\Users\Admin\AppData\Local\Temp\c63ec57c64698c0833133b56825446cb535c1d7d69317565b06ac421e3b3b390.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2000