Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21-08-2023 21:12
Static task
static1
Behavioral task
behavioral1
Sample
d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe
Resource
win10v2004-20230703-en
General
-
Target
d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe
-
Size
4.1MB
-
MD5
cf366d4af1e18e1541786132cf183394
-
SHA1
cf7a0246407b9bed2ed24a65600191022029a4fb
-
SHA256
d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d
-
SHA512
7d4bb2f94730f150debd6274ab1ca843e9f051311b301e746c9eebcfbe6736e4d2e99ec7b384a9e208e4ed291063a7f4197544dbed4a581359abfb6ecbcfc3df
-
SSDEEP
98304:LYpWsdG6eBa9nu8tP3+bGkj3Mfa8pfkUCMx:0pWclIqeGkwfa8p/CMx
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2600-8754-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2600-8758-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2600-8761-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2600-8764-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2600-8768-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2600-8771-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2600-8774-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2600-8777-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2600-8780-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2600-8783-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2600-8808-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Wow6432Node\Interface d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Wow6432Node\Interface\{E08224C6-E734-EC46-E57A-E20C5308E6B9}\ = "iyi50CTB+2IFl2+MQqc3VIhNWthPKe060TWyzF2arii00y763FvLrqQhsdAjweZi8JdijCSnN1KhRlLYTinYOrw1pcw/mq4mtNMu+txby647r6ngwLM7OH8+S7y9kx2w" d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Wow6432Node\Interface\{E08224C6-E734-EC46-E57A-E20C5308E6B9} d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Wow6432Node d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe 2600 d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe"C:\Users\Admin\AppData\Local\Temp\d09458edccd0655280a54d1818ac70ca726f3db3d5ad45e2cae1b6b404a32b5d.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2600