Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 15:22
Behavioral task
behavioral1
Sample
0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe
-
Size
24KB
-
MD5
0dcf2b0a8ec1c3d12c6ed558068e0691
-
SHA1
9b6d556dd85226e176296add8a5e44a807e5d29f
-
SHA256
0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0
-
SHA512
091011d6390c1dc394ed7775e3ae8ceba424a19cb1e74b25db574de8cf48268f580acd7704ff6c74b09e8dddbae7aab4392f22a5750fcd8e00dc6af9470ff0ba
-
SSDEEP
384:FZcpzCIqdG3A3WUkx38GZDJuJbf1+o44u8gHzUGOcIKg6PiKDtLp6kD:SCIqdH/k1ZVcT194jp4lDKg6KAJvD
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/900-54-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral1/memory/900-56-0x0000000000800000-0x000000000080D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\Harry Potter.ShareReactor.com 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\WinRAR.v.3.2.and.key.com 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe File created C:\Program Files\Common Files\Microsoft Shared\Winamp 5.0 (en).com 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\Harry Potter.exe 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\Winamp 5.0 (en).exe 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\Harry Potter.exe 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\Kazaa Lite.com 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\Winamp 5.0 (en).com 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\lsass.exe 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe File created C:\Windows\lsass.exe 0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe"C:\Users\Admin\AppData\Local\Temp\0dfdf336bde8381fb02af246969dce1b59d80d9e196444247cb6a5cc52ff32d0.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:900