Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
09380b1792af2b701cc3ebaf8cf60949.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09380b1792af2b701cc3ebaf8cf60949.exe
Resource
win10v2004-20231222-en
General
-
Target
09380b1792af2b701cc3ebaf8cf60949.exe
-
Size
5.8MB
-
MD5
09380b1792af2b701cc3ebaf8cf60949
-
SHA1
c61c29386b864495813ea378265107f6a819c16e
-
SHA256
b59e1c653ceeee1f225dedcce24aaa2ea47ccef0b5dba3b2355d9ab49352909f
-
SHA512
9d23343b69762ceb7f4a39376531ae7775ec3d8e479717650356d7ac45fa119bd261205a7311ce3c25f61566f390508fb0768c1ed8beb08deebf5fe3e213ab77
-
SSDEEP
49152:bzeo6U+YJJbce5QSb0wtxmH7aCDoD1rTrWvKYgbsT4AvCB7Jcyq/FBGS26iK+V5U:bzeoDRJ/WoD1rH1/nlpsuaZXK63
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1352 set thread context of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main 09380b1792af2b701cc3ebaf8cf60949.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2056 09380b1792af2b701cc3ebaf8cf60949.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2056 09380b1792af2b701cc3ebaf8cf60949.exe 2056 09380b1792af2b701cc3ebaf8cf60949.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28 PID 1352 wrote to memory of 2056 1352 09380b1792af2b701cc3ebaf8cf60949.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\09380b1792af2b701cc3ebaf8cf60949.exe"C:\Users\Admin\AppData\Local\Temp\09380b1792af2b701cc3ebaf8cf60949.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\09380b1792af2b701cc3ebaf8cf60949.exe"C:\Users\Admin\AppData\Local\Temp\09380b1792af2b701cc3ebaf8cf60949.exe" ""2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2056
-