Analysis
-
max time kernel
154s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-06-2023 12:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
07152899.exe
Resource
win7-20230220-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
07152899.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
07152899.exe
-
Size
1.3MB
-
MD5
70fc8ed66dcbf35718325bd94f7dd1e7
-
SHA1
cd36fdf88632fa7676d5d5f649d44f2ac4f2342f
-
SHA256
c03c9d22c013990be03bf7bfc65cb34db47beb0381856b992c340dfd5b6406b2
-
SHA512
eff121acdc3eeb38cb8826e8507b8458daacd51cd058dec600b747a94a05e07088ded4eb912973bcfc846dee6e0001109cf914a26335c0bd430c12a703aa5dea
-
SSDEEP
24576:c7YKIYHC9+TrolcVDql1BdPYJ5jJtf4ShbWolOHoFN6WtljaEyEg:cUKI3gAeDqvbOtrhZ8HoFN6WtljaEyE
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\Terms.exe" 07152899.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe 1196 07152899.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Terms.exe 07152899.exe File opened for modification C:\Windows\Terms.exe 07152899.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1196 07152899.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1196 07152899.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07152899.exe"C:\Users\Admin\AppData\Local\Temp\07152899.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1196