Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/02/2023, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
c564c68679dff6045d635f724a88797834ccb8d178719fdd6817f4ecd81e465a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c564c68679dff6045d635f724a88797834ccb8d178719fdd6817f4ecd81e465a.exe
Resource
win10v2004-20221111-en
General
-
Target
c564c68679dff6045d635f724a88797834ccb8d178719fdd6817f4ecd81e465a.exe
-
Size
28KB
-
MD5
a5200662d97f700baae58efe87be7dd0
-
SHA1
cd4ff37e542c87463918f9f2db0b4b261f7d8790
-
SHA256
c564c68679dff6045d635f724a88797834ccb8d178719fdd6817f4ecd81e465a
-
SHA512
d4482f0cde10f6bb341b149213163f8201b97356413ea3aa1dd897f392093499bdfa4754e40792907742b10db5ab8f51b77802b1f3a21c11cc1dcff88ce96d1e
-
SSDEEP
384:tAXeS7BFtwVoG1vZZnzEETN9BbGZcwXEeyLvZZ:tAXJNjKvZZnzEEB/9J7LvZZ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run c564c68679dff6045d635f724a88797834ccb8d178719fdd6817f4ecd81e465a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Jfx DDNS = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\c564c68679dff6045d635f724a88797834ccb8d178719fdd6817f4ecd81e465a.exe\"" c564c68679dff6045d635f724a88797834ccb8d178719fdd6817f4ecd81e465a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 964 c564c68679dff6045d635f724a88797834ccb8d178719fdd6817f4ecd81e465a.exe