Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 10:30
Behavioral task
behavioral1
Sample
8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728.exe
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728.exe
-
Size
25KB
-
MD5
105276f0e571824c42526db80f6cc1fb
-
SHA1
99d100933494ea5f8972a460f4be725941937d9e
-
SHA256
8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728
-
SHA512
4ac3be7e13f1fd68da91db72a5b9a3f26bc23af7e50f69f0a342f60c386514de209050384576cef7020ae7d59e0c0e0042a4883a67af9d852d7959ce2121abf5
-
SSDEEP
384:L7cyPTWOBHrbPxnEeEd0Dr0zKVrQQXKD9KDSKDqdQNn:fVKOBHrbPxnGWDr5MQ2dQN
Score
10/10
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728.exe -
resource yara_rule behavioral1/memory/1444-56-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TempCom = "C:\\WINDOWS\\FONTS\\A4BF1.com" 8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\FONTS\A4BF1.com 8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728.exe File opened for modification C:\WINDOWS\FONTS\A4BF1.com 8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1444 8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728.exe"C:\Users\Admin\AppData\Local\Temp\8c11f2069335a2aaa4b7f5fbaa0c61c4d3bd009d7eef6497cc69901985f31728.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1444