Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07-10-2023 18:01
Static task
static1
Behavioral task
behavioral1
Sample
ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe
Resource
win10v2004-20230915-en
General
-
Target
ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe
-
Size
2.6MB
-
MD5
3ce484997b84e040e9245339793c1592
-
SHA1
8f0bf623fc7b2e55fabaa866a26a315b4bc60ecf
-
SHA256
ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164
-
SHA512
aa728ea855e363d43720c44ebd83ba82c58eaaf1976978262d9d57e52c8201a63890ac8532ae758a085e1a8ea67b27fe6a39a1bfe98c639a98029554ea934d7c
-
SSDEEP
49152:m/6YUK2OF2CBhF2DRYxV+ixXLDpz0FZqUHbSCab/rO0bD1Se5ZG28Ty:bYUHPahF2DRw+ix7Dp6ZqAbXabU6d
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\kiss.she ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe -
resource yara_rule behavioral1/memory/2360-1-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-5-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-6-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-7-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-10-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-8-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-14-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-17-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-22-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-30-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-36-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-48-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-50-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-46-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-44-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-42-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-40-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-38-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-34-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-32-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-28-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-26-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-24-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-20-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-12-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2360-53-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2360 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe 2360 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe 2360 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2360 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe 2360 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe 2360 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe"C:\Users\Admin\AppData\Local\Temp\ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2360