Analysis
-
max time kernel
130s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/07/2023, 08:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
syzj.exe
Resource
win7-20230712-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
syzj.exe
Resource
win10v2004-20230703-en
7 signatures
150 seconds
General
-
Target
syzj.exe
-
Size
1.6MB
-
MD5
ac652a9db383d5233e72a5de00924538
-
SHA1
f7ca25b398ae391bb32c2497a43909761fd69cb7
-
SHA256
0e4b0a3673f6d4a1c3948960fc5dd2079ccf298a025678ca9cae3a7977ce58df
-
SHA512
c5e4a044d166e73559ddffdc808bd41b77db1734e7aa0f8c9a12e9713016397bae27bc2550e726e788037018b2e635fe4f65d283499bab1db5b00a7de76990a6
-
SSDEEP
24576:eyYGrpMfA2dMUQ/Il4Zp3JrLjgBiyTjeIEhj4hLwh:LwdpQAlGJrLEaDRu2
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\syzj.lnk syzj.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Control Panel\Desktop\Wallpaper syzj.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ToDesk\config.ini syzj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Control Panel\Desktop\WallpaperStyle = "0" syzj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Control Panel\Desktop\TileWallpaper = "0" syzj.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 860 syzj.exe 860 syzj.exe 860 syzj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 860 syzj.exe 860 syzj.exe