Analysis
-
max time kernel
39s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 05:12
Static task
static1
Behavioral task
behavioral1
Sample
aaa964789a07397261d49464d08f16170566b470033624cbf850a21e23b0633d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aaa964789a07397261d49464d08f16170566b470033624cbf850a21e23b0633d.exe
Resource
win10v2004-20220812-en
General
-
Target
aaa964789a07397261d49464d08f16170566b470033624cbf850a21e23b0633d.exe
-
Size
68KB
-
MD5
67ef4e24a21bfb31d5ea03bc130de63a
-
SHA1
582b82da6ad0635f40f38fcdfdf3f9eb5f610fd5
-
SHA256
aaa964789a07397261d49464d08f16170566b470033624cbf850a21e23b0633d
-
SHA512
9da22a2eaaca74aba814f9c8ac6fd5263a5fca183b2ec06d456b8ac8e49d5f3e4cf016558fc103fc8af73984c82d970c29afa6af43bb462b27d026579b918219
-
SSDEEP
768:Zc9liTdyyAl+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:G9Ix9AcqOK3qowgnt1d
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aaa964789a07397261d49464d08f16170566b470033624cbf850a21e23b0633d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run aaa964789a07397261d49464d08f16170566b470033624cbf850a21e23b0633d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2464 aaa964789a07397261d49464d08f16170566b470033624cbf850a21e23b0633d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaa964789a07397261d49464d08f16170566b470033624cbf850a21e23b0633d.exe"C:\Users\Admin\AppData\Local\Temp\aaa964789a07397261d49464d08f16170566b470033624cbf850a21e23b0633d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵PID:4344
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5866def71101f353699f6dc941f4c12d0
SHA18c70d35b753452dd4dbcadf089b540da7ad451d0
SHA256f9c61627f934020956e744d95a3c5dc44b24cc25ef81cd50f0fe6265c47f4300
SHA512377e627bddc14c5d033457dc840b2e26c3e487f5429cabcf98b1f53758463f16b78de4991251fb8e9a3dd5ebe09885ce7461ae5812f5b196a2d829eeeaef8775
-
Filesize
32KB
MD54656e0906855fc1ce1a57cb1bc88d8fd
SHA188def30a661bb321e8fedf69fdf6a9f99b823fcd
SHA25689749385180c77eb26acfdcb9478cbb4501d6991572411b0059f92f82ae01642
SHA512dda80872462fa64f058db610cd185705fb6b4031d985824c3bc17475882ce7b18f645ff31d4465d12910305f50a4d1fb46af1dbc7292e17a9dc93e310629f1bd