Analysis
-
max time kernel
162s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 21:29
Static task
static1
Behavioral task
behavioral1
Sample
12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe
-
Size
392KB
-
MD5
cc1f6560f58ca3fac7c3a2dc51ef8878
-
SHA1
938281bebd33245312e6c264fdf73374ed3bd1d5
-
SHA256
12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474
-
SHA512
0dcd3f26ec3e69977555acd7f22feb632ece792a778c54d839c212cc9a152f039144b435ec44542f286a6b6b96e802552b3df79095bfc38f2fc70cdad270a86a
-
SSDEEP
6144:Lt/3d3mlYM4Ac0knk3RnhkG/c+s+9hTNKVDvVNm702km1dhtt:X0YMBkn4RnhkGU+ThKBPs02kmdp
Malware Config
Signatures
-
Modifies registry class 5 IoCs
Processes:
12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CID\{56004B00-6300-7000-5300-440037002F00} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CID\{56004B00-6300-7000-5300-440037002F00}\1 = "8Q0th+9i/0GsFKhwfJPynPTvRKtlyM/Kk2NOlCzjWnqNyJdxuvySnpR30VZb3q0VNILRy4rjGcPJuCb+JuObhgyOrfWiogRFSfjTAQLiy+q7bHwVhgCQIGh93x5LFYLKl3ahURFOL1ivDQEH/soDVzHFSMqYv5TwG/TzN171XjXcoRrdf0dNQYH89XjWM6tc" 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CID\{2B005300-3900-6100-6700-7A0036006900} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CID 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CID\{2B005300-3900-6100-6700-7A0036006900}\1 = "E5O8RMxnOqZ7p04XBm2vawxLi1zmg9XizCB6moiWD9GeLB2OURMS0NBiQQhvCpGDuj4wFrp23nl4mELgtDmvZk7tBRFbGBzmj6HsBg8BlTIEG76kmp96dHfUt3KYg/IOxX1YuP5ItW99dlW1pkPy6TFwpqYblk6yadw7evjh5abHPh0ZSkddFwkJ+r1frkPxoXxj+qM0jM3OxBToXIWs4ZVZZ+DsKZCGSVjH1bHdJWwMHkuIhRR6DnUDlstY/G5/tfBrz6eH9zk5YrrO/Eqoe3L7pvglTpRJ9+PGEBMG/SjH6B6giiWFeSl84VvrSflnwFG92GTiSXcI8nbhdVEPjbZNUrlLo25e6VpE3qOErmu9DJ/My2B3a5TKPNpefQeIQfWu0fNzMZd3CaECHoC+K5bPT3HS7vYX6QBBJ+DMXkN3I8FnoTqrwMgmEZ+E+x2YJTL4nBPloZVRRfvOe1plcw==" 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe -
NTFS ADS 6 IoCs
Processes:
12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp:{56004B00-6300-7000-5300-440037002F00} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe File created C:\Users\Admin\Documents\My Music:{56004B00-6300-7000-5300-440037002F00} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe File created C:\odt:{56004B00-6300-7000-5300-440037002F00} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe File created C:\Users\Admin\AppData\Local\Temp:{2B005300-3900-6100-6700-7A0036006900} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe File created C:\Users\Admin\Documents\My Music:{2B005300-3900-6100-6700-7A0036006900} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe File created C:\odt:{2B005300-3900-6100-6700-7A0036006900} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3496-132-0x0000000000760000-0x00000000007CA000-memory.dmpFilesize
424KB
-
memory/3496-133-0x00000000057A0000-0x0000000005DB8000-memory.dmpFilesize
6.1MB
-
memory/3496-134-0x0000000005200000-0x0000000005266000-memory.dmpFilesize
408KB
-
memory/3496-135-0x0000000005F90000-0x000000000605E000-memory.dmpFilesize
824KB