Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
07926a988a310ceb85546a094c709eed.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
07926a988a310ceb85546a094c709eed.exe
-
Size
840KB
-
MD5
07926a988a310ceb85546a094c709eed
-
SHA1
c054942453e95b3a9de4cb1338f905e3c297ae77
-
SHA256
02ab7f85bf26a232c845351c2b41b26ed6deceba9f363d75ab8b04c4e63856a2
-
SHA512
eb70f7b88aee908d8659ae7956024aa32f512cce7415b520467b8c32c4d4892b48c2d530cdd409e005271bee32a9df6eb7bb32231f3d47eb969a31442157423a
-
SSDEEP
24576:X73BWaNzR5JN9T1MDSJegoL8+7Yz5urfR4j2c:X7RVRn1MjVYzwrfR4ac
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 07926a988a310ceb85546a094c709eed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 07926a988a310ceb85546a094c709eed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 07926a988a310ceb85546a094c709eed.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 07926a988a310ceb85546a094c709eed.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 07926a988a310ceb85546a094c709eed.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2172 07926a988a310ceb85546a094c709eed.exe 2172 07926a988a310ceb85546a094c709eed.exe