Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
046d7a009a540f753916a5180435c19d.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
046d7a009a540f753916a5180435c19d.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
046d7a009a540f753916a5180435c19d.exe
-
Size
56KB
-
MD5
046d7a009a540f753916a5180435c19d
-
SHA1
d02562b06148a8f435e13610a0c39e9b546c06c1
-
SHA256
04677e56dec7ba45a4b4ce83b76d7a400a8e5526fdab857f4f110c30506102d9
-
SHA512
55fa611e3a1d21eee8e92f6c532a37dd7fe0b56c4d5a7e9f384c43cc94608908a621e3ba63f3902f132eb883e04bcc7588c719e710a1b5907aa11e0d25215978
-
SSDEEP
1536:WmURuIjD73xwTHdIphXQ90+d0DaisKldr:WZ7n3uIPl+dyH
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" 046d7a009a540f753916a5180435c19d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe 046d7a009a540f753916a5180435c19d.exe File opened for modification C:\Windows\SysWOW64\runouce.exe 046d7a009a540f753916a5180435c19d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2004 2824 046d7a009a540f753916a5180435c19d.exe 28 PID 2824 wrote to memory of 2004 2824 046d7a009a540f753916a5180435c19d.exe 28 PID 2824 wrote to memory of 2004 2824 046d7a009a540f753916a5180435c19d.exe 28 PID 2824 wrote to memory of 2004 2824 046d7a009a540f753916a5180435c19d.exe 28 PID 2824 wrote to memory of 2004 2824 046d7a009a540f753916a5180435c19d.exe 28 PID 2824 wrote to memory of 2004 2824 046d7a009a540f753916a5180435c19d.exe 28 PID 2824 wrote to memory of 2004 2824 046d7a009a540f753916a5180435c19d.exe 28 PID 2824 wrote to memory of 1368 2824 046d7a009a540f753916a5180435c19d.exe 7 PID 2824 wrote to memory of 1368 2824 046d7a009a540f753916a5180435c19d.exe 7
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\046d7a009a540f753916a5180435c19d.exe"C:\Users\Admin\AppData\Local\Temp\046d7a009a540f753916a5180435c19d.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\046d7a009a540f753916a5180435c19d.exe"C:\Users\Admin\AppData\Local\Temp\046d7a009a540f753916a5180435c19d.exe"3⤵PID:2004
-
-