Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2023 21:44
Static task
static1
Behavioral task
behavioral1
Sample
stream.deb
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
stream.deb
Resource
win10v2004-20230221-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
stream.deb
-
Size
3.6MB
-
MD5
eead578290df86c4e9088fe101773337
-
SHA1
53f0fa07e9082e58200cec7649dbe6c08571e54e
-
SHA256
4e0a3c80bbaec9387983f025a4f4cff48dbeb46be38af33033877352f0a59bdc
-
SHA512
76b2dd45579b5defe29ac71ae66a419659a8b650e3a23f7b768f5168a93d25c4e910b7e999e2bd253b52f765ccecebf0f1feca6b8e3e124ace3a4a027ddb0dfc
-
SSDEEP
98304:cgfCQZkTshXJjZUnd42Deno/lSuv9rxEzoowoW:cgbNXVZUd48eo/lZFgoo5W
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1408 wrote to memory of 1292 1408 cmd.exe rundll32.exe PID 1408 wrote to memory of 1292 1408 cmd.exe rundll32.exe PID 1408 wrote to memory of 1292 1408 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\stream.deb1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\stream.deb2⤵
- Modifies registry class
PID:1292
-