Analysis
-
max time kernel
123s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 00:31
Behavioral task
behavioral1
Sample
1d192f7c99e0e783d9e85d1c4f4a1195.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1d192f7c99e0e783d9e85d1c4f4a1195.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
1d192f7c99e0e783d9e85d1c4f4a1195.exe
-
Size
1.4MB
-
MD5
1d192f7c99e0e783d9e85d1c4f4a1195
-
SHA1
b31f740c61e23a06898c09c338cd575205333ac4
-
SHA256
18a8bcfe2f4ac00066bde3d35e5b582108656118722cda85a5b24e1cd83244f9
-
SHA512
1322cdc60becb62d1d576c46a5a8f84e13c6cf9e03d70d5a3b350b4f06dfcade01b1f40f9133f1882030b67cfacb1c6fd0c3ea7770b826562eeab9abba245809
-
SSDEEP
24576:1Po5tS3wzP9Au7b3c5EhYBScCBCZSWpDdU3jv0QEEXkzZbiVH9He2G/0ONiQyVJQ:yS3KP9AIb3cehYB8BRh8XEUzZEI0/+/F
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1988-18-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-20-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-24-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-29-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-33-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-37-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-40-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-39-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-38-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-36-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-35-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-34-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-32-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-31-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-30-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-28-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-27-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-26-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-25-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-23-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-21-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-19-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/2512-16-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/1988-13-0x0000000000400000-0x00000000006FF000-memory.dmp themida behavioral1/memory/2512-3-0x0000000000400000-0x00000000006FF000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\MeqdfdV = "c:\\ProgramData\\AbglxyF\\HlpxfeB\\MeqdfdV.exe" notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2512 set thread context of 1988 2512 1d192f7c99e0e783d9e85d1c4f4a1195.exe 16 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2512 1d192f7c99e0e783d9e85d1c4f4a1195.exe 1988 notepad.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1988 2512 1d192f7c99e0e783d9e85d1c4f4a1195.exe 16 PID 2512 wrote to memory of 1988 2512 1d192f7c99e0e783d9e85d1c4f4a1195.exe 16 PID 2512 wrote to memory of 1988 2512 1d192f7c99e0e783d9e85d1c4f4a1195.exe 16 PID 2512 wrote to memory of 1988 2512 1d192f7c99e0e783d9e85d1c4f4a1195.exe 16 PID 2512 wrote to memory of 1988 2512 1d192f7c99e0e783d9e85d1c4f4a1195.exe 16 PID 2512 wrote to memory of 1988 2512 1d192f7c99e0e783d9e85d1c4f4a1195.exe 16
Processes
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
C:\Users\Admin\AppData\Local\Temp\1d192f7c99e0e783d9e85d1c4f4a1195.exe"C:\Users\Admin\AppData\Local\Temp\1d192f7c99e0e783d9e85d1c4f4a1195.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512