Analysis
-
max time kernel
226s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd.exe
Resource
win10v2004-20221111-en
General
-
Target
ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd.exe
-
Size
556KB
-
MD5
a4059e2d1015a5e4daf7a6e14e4a729d
-
SHA1
a2cb1c18e7de1feae52f6086c73ab80f4d13bd07
-
SHA256
ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd
-
SHA512
b2637009fefe5979f87d32b6601f42f6d3d4642ede18e3c4da7b0fcf094ea6e67e9389dcacdd5df174d800e08f76e21af217aa1fd0d9c1c4acca8805ba703ed2
-
SSDEEP
6144:2WtlV5LDS0np5bqd4+IEDZeRqSyN7R42xlza5vRpUe0eAIJtHckALOC6KzR:dLDf5bqdjZsVs7RDliv7UUx6kY
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\system.exe" ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\win = "C:\\windll.exe" ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\windll = "C:\\windll.exe" ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\win.exe" ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1940 ad714afb4e0a49048074937198815b9435b3139f88b18358640fd4577a462ccd.exe