Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 17:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0906d9dfbf69eb80618714011459007b.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
0906d9dfbf69eb80618714011459007b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
0906d9dfbf69eb80618714011459007b.exe
-
Size
143KB
-
MD5
0906d9dfbf69eb80618714011459007b
-
SHA1
7df0453dabf2800cd59d8bec4246a42292dbf786
-
SHA256
9830a1ef06408430b61a7823850572656b852c0bb184bccf14f552046fa4b5f9
-
SHA512
c4fdb631d64549ec563bb5a4341050e3feea4605c6fa453f900b3f6c6c86d3c5847ab17e4d4505599148d5dc9054ed2c0e0ef768965b483a1906a12b396a09f9
-
SSDEEP
768:VK2Rg/Jot8nKtevOcCXyjiQ8PhmPUYh9GOHZ:kkVHCjiQkmbZ
Score
10/10
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 0906d9dfbf69eb80618714011459007b.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0906d9dfbf69eb80618714011459007b.exe -
Disables use of System Restore points 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\LvbdhfngNAkNz1xzL = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0906d9dfbf69eb80618714011459007b.exe" 0906d9dfbf69eb80618714011459007b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LvbdhfngNAkNz1xzL = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0906d9dfbf69eb80618714011459007b.exe" 0906d9dfbf69eb80618714011459007b.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" 0906d9dfbf69eb80618714011459007b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2044 0906d9dfbf69eb80618714011459007b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0906d9dfbf69eb80618714011459007b.exe"C:\Users\Admin\AppData\Local\Temp\0906d9dfbf69eb80618714011459007b.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2044