Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
18/11/2023, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae.exe
Resource
win7-20231023-en
General
-
Target
76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae.exe
-
Size
2.0MB
-
MD5
df65df01fac65178e1f37d1a41aeee29
-
SHA1
529e1ba0b4002c4a823f36e94cd7f005f350de46
-
SHA256
76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae
-
SHA512
fbd7fd2ba54b8ea952582179f20ad8003d820d2a9670938cf34736f485d29400ed9088132423734d4456ef8122fd02dd7c266e3709ab2ea671cc83e585f95db4
-
SSDEEP
49152:Yuri2899OM/gSY8wHTsb+92hnHO6xfV6vq7NrpOPfgLs1OADgMRM:Yuri79jgSY3Two2hHXxL7NrpjH
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
resource yara_rule behavioral1/memory/2848-1-0x0000000002020000-0x00000000030DA000-memory.dmp upx behavioral1/memory/2848-3-0x0000000002020000-0x00000000030DA000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2848 76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae.exe 2848 76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae.exe 2848 76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae.exe 2848 76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae.exe 2848 76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae.exe 2848 76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae.exe 2848 76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae.exe 2848 76060be8c6321d2ba710bc23f90d2861e80c6578f6ce0802f45e22c1c0fff1ae.exe