Analysis
-
max time kernel
50s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1aa76ffaabc0b409f24ed5d0ea846322.exe
Resource
win7-20231129-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
1aa76ffaabc0b409f24ed5d0ea846322.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
1aa76ffaabc0b409f24ed5d0ea846322.exe
-
Size
156KB
-
MD5
1aa76ffaabc0b409f24ed5d0ea846322
-
SHA1
8727d57b16baa2a5ced8661d5156f332f8ea1815
-
SHA256
e244a34432a3d1e2c62a9b7d3e1aa41d38fffa4a28695d116bf570fe62aa1541
-
SHA512
b42d3864f5f79846bfa6e4599e61b9a2029180a8663cf6e104fd757efdaa14ee000d97d5f8d6110dd0fa265f71564f896b3c7b277c1685fceea8fa77b9e64f8b
-
SSDEEP
1536:B1t/PfBr9GiL15M6UbbCp39yX2tHZ7bt0i6pZYmcfgT6:B7Zr9/5M6UvCpLtH5bt05pZYm1O
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1aa76ffaabc0b409f24ed5d0ea846322 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1aa76ffaabc0b409f24ed5d0ea846322.exe" 1aa76ffaabc0b409f24ed5d0ea846322.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1aa76ffaabc0b409f24ed5d0ea846322 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1aa76ffaabc0b409f24ed5d0ea846322.exe" 1aa76ffaabc0b409f24ed5d0ea846322.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1328 1aa76ffaabc0b409f24ed5d0ea846322.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1328 wrote to memory of 4448 1328 1aa76ffaabc0b409f24ed5d0ea846322.exe 17 PID 1328 wrote to memory of 4448 1328 1aa76ffaabc0b409f24ed5d0ea846322.exe 17 PID 1328 wrote to memory of 4448 1328 1aa76ffaabc0b409f24ed5d0ea846322.exe 17 PID 1328 wrote to memory of 4932 1328 1aa76ffaabc0b409f24ed5d0ea846322.exe 19 PID 1328 wrote to memory of 4932 1328 1aa76ffaabc0b409f24ed5d0ea846322.exe 19 PID 1328 wrote to memory of 4932 1328 1aa76ffaabc0b409f24ed5d0ea846322.exe 19 PID 1328 wrote to memory of 4456 1328 1aa76ffaabc0b409f24ed5d0ea846322.exe 104 PID 1328 wrote to memory of 4456 1328 1aa76ffaabc0b409f24ed5d0ea846322.exe 104 PID 1328 wrote to memory of 4456 1328 1aa76ffaabc0b409f24ed5d0ea846322.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa76ffaabc0b409f24ed5d0ea846322.exe"C:\Users\Admin\AppData\Local\Temp\1aa76ffaabc0b409f24ed5d0ea846322.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /u /s scpsssh2.dll2⤵PID:4448
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /u /s c:\windows\syswow64\scpsssh2.dll2⤵PID:4932
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /u /s c:\windows\syswow64\scpsssh2.dll2⤵PID:2056
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /u /s scpsssh2.dll2⤵PID:4456
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /u /s c:\windows\syswow64\scpsssh2.dll2⤵PID:3460
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /u /s scpsssh2.dll2⤵PID:4932
-