Analysis
-
max time kernel
202s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 01:31
Static task
static1
Behavioral task
behavioral1
Sample
b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe
Resource
win7-20220901-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe
-
Size
56KB
-
MD5
31ce80fef69fde15ddf89c19e2a5ffa1
-
SHA1
a517b9b5631ae5c8889f5eadf5c76fbe1ab6f0b5
-
SHA256
b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58
-
SHA512
b2aff595196fff8434c872e88350acbdc5865900711d7adc929026cb204bf8cf2c673f2b4ee2f3df3c65119d87a1f9d6f0142736b513c637d11b5fe98b4cbf1c
-
SSDEEP
1536:3zle6As5mnmbuPP8QjcMjYbwTXo9TXAyL0R3iC:3/5NnQQM/o9tEh
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\Welcome.html b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\sekbhrbe.exe b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\README-JDK.html b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\qrhljwvn.exe b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\RELEASE-NOTES.html b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E88A8DA-6487-F103-FFE5-C2B0648486DC}\LocalServer32\ = "C:\\Program Files\\Java\\jdk1.8.0_66\\jre\\sekbhrbe.exe" b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{93F91C69-0757-9AC2-53C1-514848C940A7}\ = "kstwjkwkrttexlkw" b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{93F91C69-0757-9AC2-53C1-514848C940A7}\LocalServer32 b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{93F91C69-0757-9AC2-53C1-514848C940A7}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe" b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1} b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\ = "ljlnvsccssjvrnqr" b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\LocalServer32\ = "C:\\Program Files\\Java\\jdk1.8.0_66\\db\\qrhljwvn.exe" b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{93F91C69-0757-9AC2-53C1-514848C940A7} b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\LocalServer32 b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E88A8DA-6487-F103-FFE5-C2B0648486DC} b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E88A8DA-6487-F103-FFE5-C2B0648486DC}\ = "tbkhessesrlkhwhh" b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E88A8DA-6487-F103-FFE5-C2B0648486DC}\LocalServer32 b4a7a665b991cb02e6e9c25eb2fc9870f3eaa26629fba888056d4ee136d8ab58.exe