Analysis

  • max time kernel
    151s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 22:57

General

  • Target

    feb2f64af1bb616edaa8a95d280a31d97a1dadc353f6488c169d9950d98ed3f5.exe

  • Size

    2.8MB

  • MD5

    25817a64ccdc0069e9e5f08ff09c6a53

  • SHA1

    f91d65fa914152674ec8dbf4a027fca06d25e873

  • SHA256

    feb2f64af1bb616edaa8a95d280a31d97a1dadc353f6488c169d9950d98ed3f5

  • SHA512

    8c78ccd2401672027ed57108c451cd01d71bdd3e224222d1566366056177c3e4e935057157009d0e3d3885fd149979cd27c3452d28d8d5f419dde27a49d62841

  • SSDEEP

    49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlH5mWO06z+EloIo:Q+8X9G3vP3AMHmay+E7o

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\feb2f64af1bb616edaa8a95d280a31d97a1dadc353f6488c169d9950d98ed3f5.exe
    "C:\Users\Admin\AppData\Local\Temp\feb2f64af1bb616edaa8a95d280a31d97a1dadc353f6488c169d9950d98ed3f5.exe"
    1⤵
      PID:2392
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2572-0-0x0000000003F40000-0x0000000003F41000-memory.dmp

      Filesize

      4KB

    • memory/2572-1-0x0000000003F40000-0x0000000003F41000-memory.dmp

      Filesize

      4KB

    • memory/2572-5-0x0000000002630000-0x0000000002640000-memory.dmp

      Filesize

      64KB