Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe
Resource
win10v2004-20220901-en
General
-
Target
a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe
-
Size
2.3MB
-
MD5
12a288523f52fb78846b0e0eec54189b
-
SHA1
4d4f3df4ec1616db550cffd9885ee8b8a586ed7b
-
SHA256
a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843
-
SHA512
1a26f047b1dccb962161daf70f97684376786e599060c5e032e1a72003275e30ad4ffef44ef0e05564d8ab02b4d1d6c3df0de13978b605bbf85b9d16272b50a6
-
SSDEEP
49152:Glmwi6AU2tDCSS1hNVET3Tk0IwMAGwYL2kJj+6VqqEd/O4z:36AU2ZSNVET3TCihta+s4z
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xservicex = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe" a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 896 a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe 896 a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe 896 a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe 896 a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe 896 a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe 896 a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe 896 a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe 896 a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 896 a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 896 a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe"C:\Users\Admin\AppData\Local\Temp\a24da555e55ad40e1db95800b60d3f10f6f2d0ce2964f07b239a099837fbb843.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:896