Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 08:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
10da92002327ad6a43757698a6e56197.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
10da92002327ad6a43757698a6e56197.exe
-
Size
524KB
-
MD5
10da92002327ad6a43757698a6e56197
-
SHA1
526d543999ff9672be8db91933a0f0947cd0c628
-
SHA256
20a7268f2f15cad9e938de16f11beabef087f42aa09ea94682dbde710ada5403
-
SHA512
370a70d6e475e4b0709ecfc0c8ec729dca66b904b5c285b56b952f29bd407ce958eb51076cc36f5b05d3d402523f0a71e965b6fa6c3b92d4e758349269f3af1c
-
SSDEEP
12288:xR7zxL/PSUS2Mtdxz2XFB/bjbZi3S5EKLSsnuIgejNSQ1S:vzxLnS7LiXt5EKLSsnJgeJSQ1
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
10da92002327ad6a43757698a6e56197.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" 10da92002327ad6a43757698a6e56197.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
10da92002327ad6a43757698a6e56197.exedescription pid process target process PID 2440 wrote to memory of 2024 2440 10da92002327ad6a43757698a6e56197.exe dw20.exe PID 2440 wrote to memory of 2024 2440 10da92002327ad6a43757698a6e56197.exe dw20.exe PID 2440 wrote to memory of 2024 2440 10da92002327ad6a43757698a6e56197.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10da92002327ad6a43757698a6e56197.exe"C:\Users\Admin\AppData\Local\Temp\10da92002327ad6a43757698a6e56197.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 4882⤵PID:2024
-