Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2023 06:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230621-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230621-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
file.exe
-
Size
220KB
-
MD5
8d7ebe871589d79f195f240dcef43a57
-
SHA1
f5315edc9bfeb6f37c9df6ad1f10cb3363412d96
-
SHA256
19397c6dce459330095edc72759d1e79e26f1e12f013cdaee6dbdb90d65aaae8
-
SHA512
244be66bb480d320ef6d5cbfcd21e526a53726397c1fc4b512935bc50039b0bb773e3f12fd53910d3da9e69ebb8e3fd1a56d22d2fcb2e090c93c9759cdc497cd
-
SSDEEP
3072:/M8Ejf0TGpNkCdEjDOCARNT4Hxh6skqg2d1vIH+J3Ul:DEj9ICdEjDgt4RuW1vg
Score
10/10
Malware Config
Extracted
Family
systembc
C2
adstat277xm.xyz:4044
demstat377xm.xyz:4044
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
file.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Software\Microsoft\Windows\CurrentVersion\Run file.exe Set value (str) \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\file.exe'\"" file.exe