Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 22:13
Behavioral task
behavioral1
Sample
1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
General
-
Target
1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe
-
Size
15.5MB
-
MD5
f2c9e2a55730e0845fa01a4d5a5f6b60
-
SHA1
fcf6b6620a695bf2befb5a16f75170a37c6f6eb8
-
SHA256
1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c
-
SHA512
476d3b5a18318384aec507cdf0bd514e32dfaac34d5b16404567a4a90de96bcf7a058e58b20996eab75dbe01bb471469a6e2d3c8a4224578b50d0d9f474cfdc8
-
SSDEEP
393216:ysbF+nMAe4EPC4n7QcoNYz0dQ5mv4BDgyc9HOzPNn/FueDy:K92nz0dpb+1/8eDy
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2144-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-95-0x00000000003C0000-0x00000000003E6000-memory.dmp upx behavioral1/memory/2144-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-98-0x0000000003D50000-0x0000000003D76000-memory.dmp upx behavioral1/memory/2144-99-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2144-100-0x00000000003C0000-0x00000000003E6000-memory.dmp upx -
resource yara_rule behavioral1/memory/2144-5-0x0000000000400000-0x0000000001D35000-memory.dmp vmprotect behavioral1/memory/2144-56-0x0000000000400000-0x0000000001D35000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2144 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe 2144 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2144 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe 2144 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe 2144 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe"C:\Users\Admin\AppData\Local\Temp\1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2144