Analysis
-
max time kernel
238s -
max time network
249s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe
Resource
win10v2004-20221111-en
General
-
Target
77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe
-
Size
91KB
-
MD5
356d0b23332b789a7e00ad759e50903e
-
SHA1
6cf5b78a33aa9ae412a516ac57149ba72c3cb875
-
SHA256
77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e
-
SHA512
fe49ccf6c336a44f3b08de54f69b9e9ab4f1d11a27a5cc7a64effa4c3ff694ac952bfbb4acb57fff3ccc5a6203fdf178dc560f70abbcff24d85eed322d362736
-
SSDEEP
1536:ed+b/57vmGm8NbVh/w6Ivp3+Thnxbx3q0rWLqQ41G7P:eAcD8NbVOa3nrWWQRP
Malware Config
Signatures
-
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\ExitSwitch.htm 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\README-JDK.html 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\qrhljwvn.exe 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\RELEASE-NOTES.html 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe -
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7D5F1D20-8938-DF16-45AE-7F5866465A5F}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe" 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1} 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\ = "sjrnnbqjvjnslcnn" 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\LocalServer32 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\LocalServer32\ = "C:\\Program Files\\Java\\jdk1.8.0_66\\db\\qrhljwvn.exe" 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7D5F1D20-8938-DF16-45AE-7F5866465A5F} 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7D5F1D20-8938-DF16-45AE-7F5866465A5F}\ = "rzeqslxnqkwlnezr" 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7D5F1D20-8938-DF16-45AE-7F5866465A5F}\LocalServer32 77396358a9d068810f107ba6f3b4ea7a5ad8cfd79a5280e261851f1a5a012f9e.exe