Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 02:32
Static task
static1
Behavioral task
behavioral1
Sample
f9181fb1e236fe7ff63714547d815eaf1d1b1648c5ae5fca863b3957ed509806.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f9181fb1e236fe7ff63714547d815eaf1d1b1648c5ae5fca863b3957ed509806.exe
Resource
win10v2004-20220901-en
General
-
Target
f9181fb1e236fe7ff63714547d815eaf1d1b1648c5ae5fca863b3957ed509806.exe
-
Size
32KB
-
MD5
e7d16efec199284eb827340f6368a247
-
SHA1
09710c21348f6c3036a3f4242725557468caa793
-
SHA256
f9181fb1e236fe7ff63714547d815eaf1d1b1648c5ae5fca863b3957ed509806
-
SHA512
210a4ed8fc3de777f56d018e31ba9be4137577f94fe11d680807bad9d58187c7ae126f71a6618b9283dd41b5ccd97d0111aec3bdbc5e659dab14e91bb08da1de
-
SSDEEP
384:AmUUq49yMQL/ycmJTtaRZAhN+efDceRHPWhaV+M70kD:GUq49ymmm+pHFkD
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
cabasaganjunas
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\VzWJrYnjU = "C:\\Users\\Admin\\AppData\\Local\\VzWJrYnjU\\OghDDYNXd.exe" f9181fb1e236fe7ff63714547d815eaf1d1b1648c5ae5fca863b3957ed509806.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1348 f9181fb1e236fe7ff63714547d815eaf1d1b1648c5ae5fca863b3957ed509806.exe