Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
6d877fd4497afb7226d400ef49a077adb85b90bfcb2ffff369e29ee518f0b6a9.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
6d877fd4497afb7226d400ef49a077adb85b90bfcb2ffff369e29ee518f0b6a9.exe
Resource
win10v2004-20231020-en
General
-
Target
6d877fd4497afb7226d400ef49a077adb85b90bfcb2ffff369e29ee518f0b6a9.exe
-
Size
1.1MB
-
MD5
999b16014be00e2a8a03b393606df9b3
-
SHA1
11e7414a13346bd6258eb9f532dd42c99c2823a4
-
SHA256
6d877fd4497afb7226d400ef49a077adb85b90bfcb2ffff369e29ee518f0b6a9
-
SHA512
a49b3644e7adcbc54b0b938c6220814ea64a4a0f4c9a94aac7f879172ede66d82834824de6523856f17c3868c3c37e3d442645ef3563d8b815eb00fb8873df86
-
SSDEEP
24576:ilT+u3nLW0ZxoENVd/XQ49snwtEY1wFI/CsG3wO:i53nhZRVdfb94QEYiVsm
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\EDriver64.sys\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\EDriver64.sys" 6d877fd4497afb7226d400ef49a077adb85b90bfcb2ffff369e29ee518f0b6a9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2344 6d877fd4497afb7226d400ef49a077adb85b90bfcb2ffff369e29ee518f0b6a9.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2344 6d877fd4497afb7226d400ef49a077adb85b90bfcb2ffff369e29ee518f0b6a9.exe 2344 6d877fd4497afb7226d400ef49a077adb85b90bfcb2ffff369e29ee518f0b6a9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d877fd4497afb7226d400ef49a077adb85b90bfcb2ffff369e29ee518f0b6a9.exe"C:\Users\Admin\AppData\Local\Temp\6d877fd4497afb7226d400ef49a077adb85b90bfcb2ffff369e29ee518f0b6a9.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2344