Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:19
Static task
static1
Behavioral task
behavioral1
Sample
12e2ea10213cdd526f7513ccd1cb2ef6de280bfd61077b429a62267be4c39c50.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
12e2ea10213cdd526f7513ccd1cb2ef6de280bfd61077b429a62267be4c39c50.exe
Resource
win10v2004-20220812-en
General
-
Target
12e2ea10213cdd526f7513ccd1cb2ef6de280bfd61077b429a62267be4c39c50.exe
-
Size
56KB
-
MD5
1d9913378155523d36e4d0c139534111
-
SHA1
a57d5ba50e48c2be03632868613aa4f9607827ea
-
SHA256
12e2ea10213cdd526f7513ccd1cb2ef6de280bfd61077b429a62267be4c39c50
-
SHA512
4ef8d7ef07538976b0a81cee86aaec97b1afe23b4f1a162779fe7689a69fcd51109e6e374cc37cdb3fa24ed53911dbd1000ba9d391e606ee2c3732e2caf122d5
-
SSDEEP
1536:IOUea2gSS3TyVPrI7LeDO+euEnOr6ZgxkG6Ant:22+Tgs7L3o/Bt
Malware Config
Signatures
-
Modifies registry class 4 IoCs
Processes:
12e2ea10213cdd526f7513ccd1cb2ef6de280bfd61077b429a62267be4c39c50.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{86DE33BB-5601-798F-98A2-7714B590C8BD}\LocalServer32 12e2ea10213cdd526f7513ccd1cb2ef6de280bfd61077b429a62267be4c39c50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{86DE33BB-5601-798F-98A2-7714B590C8BD}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\12e2ea10213cdd526f7513ccd1cb2ef6de280bfd61077b429a62267be4c39c50.exe" 12e2ea10213cdd526f7513ccd1cb2ef6de280bfd61077b429a62267be4c39c50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{86DE33BB-5601-798F-98A2-7714B590C8BD} 12e2ea10213cdd526f7513ccd1cb2ef6de280bfd61077b429a62267be4c39c50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{86DE33BB-5601-798F-98A2-7714B590C8BD}\ = "tshqtjthjxttjetr" 12e2ea10213cdd526f7513ccd1cb2ef6de280bfd61077b429a62267be4c39c50.exe