Analysis
-
max time kernel
160s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
ec4fbce27012d19c408dfa0ef500a578fd65295f8559a073a850c2e4efc4adbb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ec4fbce27012d19c408dfa0ef500a578fd65295f8559a073a850c2e4efc4adbb.exe
Resource
win10v2004-20220812-en
General
-
Target
ec4fbce27012d19c408dfa0ef500a578fd65295f8559a073a850c2e4efc4adbb.exe
-
Size
108KB
-
MD5
aa5b0c5cc9a1531675a9f194882e8b0b
-
SHA1
ba83a23aabb709f3aa0bde0847426384e56ad39e
-
SHA256
ec4fbce27012d19c408dfa0ef500a578fd65295f8559a073a850c2e4efc4adbb
-
SHA512
d3f8e767cc8ca2e18487a6b4fcb02cd29a97eaa65acc26a2abe02a224744ce8c351d3bd0af0e3516d173200bab7673841d8d87b06415228e376831e5a4dc5492
-
SSDEEP
3072:Rlsr2J/yCSWW9F12g1momGovFOYpLb8PuP4YLQY52ZaR:R2r2phgb1m3d1/LQS
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ec4fbce27012d19c408dfa0ef500a578fd65295f8559a073a850c2e4efc4adbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PsyXeya = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ec4fbce27012d19c408dfa0ef500a578fd65295f8559a073a850c2e4efc4adbb.exe" ec4fbce27012d19c408dfa0ef500a578fd65295f8559a073a850c2e4efc4adbb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1060 ec4fbce27012d19c408dfa0ef500a578fd65295f8559a073a850c2e4efc4adbb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec4fbce27012d19c408dfa0ef500a578fd65295f8559a073a850c2e4efc4adbb.exe"C:\Users\Admin\AppData\Local\Temp\ec4fbce27012d19c408dfa0ef500a578fd65295f8559a073a850c2e4efc4adbb.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
PID:1060