Analysis

  • max time kernel
    149s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2023, 10:42

General

  • Target

    fc574edc169596e9b26c03f121144107475a358d91de0db96146e35dedfd644d.exe

  • Size

    3.4MB

  • MD5

    b7cd860cb9159a023736135134827e46

  • SHA1

    9cb6c16ecc75744f3339309cbec4cfbd2c09d417

  • SHA256

    fc574edc169596e9b26c03f121144107475a358d91de0db96146e35dedfd644d

  • SHA512

    d0aeaa9d36ba1acaf897e3ae27c9b9b058a4d2893b1eb0bb85c745f3a692adf59e1fc9edd31ad0ebe8e8f397794911cd156d0b7cea738936da457231690efe67

  • SSDEEP

    49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlO9H4AWgwsy6HixkNcyrnm:Q+8X9G3vP3AMY9H4AHvyPkNBLm

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc574edc169596e9b26c03f121144107475a358d91de0db96146e35dedfd644d.exe
    "C:\Users\Admin\AppData\Local\Temp\fc574edc169596e9b26c03f121144107475a358d91de0db96146e35dedfd644d.exe"
    1⤵
      PID:2040
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2544-0-0x0000000004390000-0x0000000004391000-memory.dmp

      Filesize

      4KB

    • memory/2544-1-0x0000000004390000-0x0000000004391000-memory.dmp

      Filesize

      4KB

    • memory/2544-5-0x0000000002740000-0x0000000002750000-memory.dmp

      Filesize

      64KB