Analysis
-
max time kernel
40s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 05:17
Static task
static1
Behavioral task
behavioral1
Sample
d3bb2c436f379285f8d32ba05c1bf9fe88f14bdcf1e4593de8947b62b055b88c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d3bb2c436f379285f8d32ba05c1bf9fe88f14bdcf1e4593de8947b62b055b88c.exe
Resource
win10v2004-20220812-en
General
-
Target
d3bb2c436f379285f8d32ba05c1bf9fe88f14bdcf1e4593de8947b62b055b88c.exe
-
Size
44KB
-
MD5
067349c2034762bc6196cea4026382c3
-
SHA1
0b2cd0c197d08a268b84af09d2312d14de976505
-
SHA256
d3bb2c436f379285f8d32ba05c1bf9fe88f14bdcf1e4593de8947b62b055b88c
-
SHA512
c6e1318e9bca1881e879bf6e9e59356b0897ae193ec461cddecccee9ad41a3d77892910147d79aad216c5950ae644c3fd0b794a786c30f9e3f7c14321c124569
-
SSDEEP
768:PWo9mv2Zi81lbsCSAtA93Wmfa4xCeEPez0JRf4nnLobK3PIk6P9Vq:PvmEu9ncCoO3Sq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run d3bb2c436f379285f8d32ba05c1bf9fe88f14bdcf1e4593de8947b62b055b88c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\d3bb2c436f379285f8d32ba05c1bf9fe88f14bdcf1e4593de8947b62b055b88c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d3bb2c436f379285f8d32ba05c1bf9fe88f14bdcf1e4593de8947b62b055b88c.exe" d3bb2c436f379285f8d32ba05c1bf9fe88f14bdcf1e4593de8947b62b055b88c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1760 d3bb2c436f379285f8d32ba05c1bf9fe88f14bdcf1e4593de8947b62b055b88c.exe