Analysis
-
max time kernel
107s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08340ff044bfc4d24bcf1ee6f5a39b25.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
08340ff044bfc4d24bcf1ee6f5a39b25.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
08340ff044bfc4d24bcf1ee6f5a39b25.exe
-
Size
304KB
-
MD5
08340ff044bfc4d24bcf1ee6f5a39b25
-
SHA1
4f3b55929aa647e46fe2107bb3989e9970cba68f
-
SHA256
3a393ce5f7d0d2d72a6332a974ae0be32a74438fc538848afbdb337818218b32
-
SHA512
6516dfa60bae1815a50a6b072cf16fb465c688b4a72ce7b35439460f4f11c60d3b38ada91392a6ad8037b370e1b2f30050b81466fc4138e3dd1ff2a9b133a16b
-
SSDEEP
6144:x8VkVZRLLX8j4BTLjreYB8YWr489tr/nKL1Q:B
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplica 08340ff044bfc4d24bcf1ee6f5a39b25.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 08340ff044bfc4d24bcf1ee6f5a39b25.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 08340ff044bfc4d24bcf1ee6f5a39b25.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 08340ff044bfc4d24bcf1ee6f5a39b25.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ 08340ff044bfc4d24bcf1ee6f5a39b25.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\08340ff044bfc4d24bcf1ee6f5a39b25.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\08340ff044bfc4d24bcf1ee6f5a39b25.exe:*:Enabled:DM" 08340ff044bfc4d24bcf1ee6f5a39b25.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\DM_Install_Program.job 08340ff044bfc4d24bcf1ee6f5a39b25.exe