Analysis
-
max time kernel
233s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:49
Behavioral task
behavioral1
Sample
dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exe
Resource
win10v2004-20221111-en
General
-
Target
dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exe
-
Size
31KB
-
MD5
27009b4a5be4b123d7e6e647d269eed2
-
SHA1
9030344ae789261b357ddf4ede02b718704572cb
-
SHA256
dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382
-
SHA512
fa0183ac2bbf6e26f77d8f38661c243fa000deece3892c6a9eedd1fd0ee160c22ff00f4d1526b392d90e8d32d2a65a4b47b74b90400f29e95616a37f364c8cc5
-
SSDEEP
768:3CIqdH/k1ZVcT194jp4ueiS3jZpYnQqW7E:3NqaLV8amuSjZqW7E
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/372-132-0x0000000000800000-0x000000000080E000-memory.dmp upx behavioral2/memory/372-133-0x0000000000800000-0x000000000080E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exe -
Drops file in Program Files directory 1 IoCs
Processes:
dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exedescription ioc process File created C:\Program Files\Common Files\microsoft shared\Winamp 5.0 (en).exe dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exe -
Drops file in Windows directory 2 IoCs
Processes:
dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exedescription ioc process File opened for modification C:\Windows\lsass.exe dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exe File created C:\Windows\lsass.exe dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exe"C:\Users\Admin\AppData\Local\Temp\dda2b737fcd5abd9acb0ff73bcf6391575c226d4f950381e7830b9b44ee5d382.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:372