Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 18:01
Static task
static1
Behavioral task
behavioral1
Sample
ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe
Resource
win10v2004-20230915-en
General
-
Target
ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe
-
Size
2.6MB
-
MD5
3ce484997b84e040e9245339793c1592
-
SHA1
8f0bf623fc7b2e55fabaa866a26a315b4bc60ecf
-
SHA256
ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164
-
SHA512
aa728ea855e363d43720c44ebd83ba82c58eaaf1976978262d9d57e52c8201a63890ac8532ae758a085e1a8ea67b27fe6a39a1bfe98c639a98029554ea934d7c
-
SSDEEP
49152:m/6YUK2OF2CBhF2DRYxV+ixXLDpz0FZqUHbSCab/rO0bD1Se5ZG28Ty:bYUHPahF2DRw+ix7Dp6ZqAbXabU6d
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\kiss.she ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe -
resource yara_rule behavioral2/memory/4868-2-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-7-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-6-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-8-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-9-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-11-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-13-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-15-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-17-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-20-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-23-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-25-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-27-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-29-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-31-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-33-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-35-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-37-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-39-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-41-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-43-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-46-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-48-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-50-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-52-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4868-55-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4868 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe 4868 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe 4868 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4868 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe 4868 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe 4868 ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe"C:\Users\Admin\AppData\Local\Temp\ab79a5d3374045e1f781df01608d616bc76500872dd10f040f75fda19b297164.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4868