Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844.exe
Resource
win10v2004-20220812-en
General
-
Target
8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844.exe
-
Size
32KB
-
MD5
1ef598dc1356c05265632a9296d3259e
-
SHA1
172eb15692f620fb7fc7faea64ee5c3c48acda92
-
SHA256
8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844
-
SHA512
e4be4d26650fde832656629914e81ef66692a0af932f04408f0d3127efe2e4ec7558ef067c141693a3d6f991713cdad421c40c51f0ff10201afd17dbb0b1065b
-
SSDEEP
384:/TUCD8keCVSbmcvWR8YG1keR/EOhaDTHsBb8keC:/QCReqSbLEa1keGigQ9Re
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run 8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\eXecutioner = "C:\\WINDOWS\\system32\\8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844.exe" 8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1788 8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844.exe"C:\Users\Admin\AppData\Local\Temp\8edd97d5a147af895396d6f3ee118aaa425c980f7c73db14686fc2e6a3a3e844.exe"1⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1788