Analysis
-
max time kernel
219s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 21:28
Static task
static1
Behavioral task
behavioral1
Sample
7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe
-
Size
422KB
-
MD5
56fa6c6dad1fd45f0a221bd90350ad93
-
SHA1
671dc326e0d8069b2ad9b1c5afd51aa5538be835
-
SHA256
7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a
-
SHA512
617b9e8124f0b4cca3cdf16d0d227b662ef83160df9c5269cedfe000940130b43fffceaa24efbd2d3d69961a62b5d904206b2b011d0e82f95b9efe1f1ff2d7be
-
SSDEEP
12288:lgGwvmTkgAGi/bhlZF8znTzVBE3Hx/EqjU:eGRHi//n8TTzfEx
Malware Config
Signatures
-
Modifies registry class 5 IoCs
Processes:
7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\CID\{74007900-6A00-3900-4500-6E0073006500} 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\CID\{74007900-6A00-3900-4500-6E0073006500}\1 = "85xdR7OkApYJrTppSzWYw9bdaULBNDlzKEtmL9nsTk4aQ55etJ+VwQj6+XTFfA5ep77sYngF2clmA0obCn9MNSnpjTJnACa/hkKw1/C1HEi8PjlLm4DwC+db2L6on02IHtF+P9B+CgN865arVzdVdUWhdRa7b3o49uwOTLJ6H186VBGThfXka1BSEyKQwrVg" 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\CID\{7A004D00-4F00-7200-5700-6D0030003900} 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\CID 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\CID\{7A004D00-4F00-7200-5700-6D0030003900}\1 = "YkJgr72M98HaFp37v3EQDs5YiM4T4E1fclJ5ZeIfHjU0TwROj5d7FJwUaB41Brws1HsXaIVraLbbo273cT1lCG0POez5kxDSKT9mNN8aLj1JE3yYxxxvc0/ZyGQLhZc+2KbAcoQb15pB2owdIGtN4R4bGCnovaP9pGqDN/QMmwJHc13dVOHvHn8e1iBXpa+AapZIF0cpGSfi3pQ3aqWeU9jAKYvztmRNj4VVmlXbyjumBpzlPiyxg68FOxuX38zrki4xsdjpOqBZQQRyHVx48HG8f3ouvFkBEiiQJ46SmQ54v4gSWIgJhU8WgW9SyhgWzX1qzD7jkVKnU8fXQbHEpt+7FEHYUvg+iI9lWYLzVH2GJoDv1/+9R8btYiMSIIEU3NBPclqIevmHB1iAO2EC+18ZcOIyeEdq3QXA4Wqjt/m+9VA0H7Ed33Fn0bMhLjRutX3PmbzUeacTQxnFe/rN4Q==" 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe -
NTFS ADS 6 IoCs
Processes:
7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp:{7A004D00-4F00-7200-5700-6D0030003900} 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe File created C:\Users\Admin\Documents\My Music:{7A004D00-4F00-7200-5700-6D0030003900} 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe File created C:\odt:{7A004D00-4F00-7200-5700-6D0030003900} 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe File created C:\Users\Admin\AppData\Local\Temp:{74007900-6A00-3900-4500-6E0073006500} 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe File created C:\Users\Admin\Documents\My Music:{74007900-6A00-3900-4500-6E0073006500} 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe File created C:\odt:{74007900-6A00-3900-4500-6E0073006500} 7c3230c3dc2019632a2cdbe9957ffca4c4c9fd92d8aa703258e84e09d523f81a.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2736-132-0x0000000000010000-0x0000000000082000-memory.dmpFilesize
456KB
-
memory/2736-133-0x0000000005160000-0x0000000005778000-memory.dmpFilesize
6.1MB
-
memory/2736-134-0x0000000004A50000-0x0000000004AB6000-memory.dmpFilesize
408KB
-
memory/2736-135-0x0000000005A90000-0x0000000005B5E000-memory.dmpFilesize
824KB