Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 10:20
Behavioral task
behavioral1
Sample
16bafa353d339b47f1bd491bf701819d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16bafa353d339b47f1bd491bf701819d.exe
Resource
win10v2004-20231215-en
General
-
Target
16bafa353d339b47f1bd491bf701819d.exe
-
Size
667KB
-
MD5
16bafa353d339b47f1bd491bf701819d
-
SHA1
8d2bb66f581a1ebbe56a35eeed60173350bf7f2c
-
SHA256
e4dcd58c1cb3b87663b44938fc723ab0211096a5366d1b5cfa1480546bb2535c
-
SHA512
1ba538d10b000fd2f7aeee389206a82cbe5c9b23b3691255edb22afb3a25a25d5227de973da7b98c98fbed01cf5eb9130379fa2b8c17145769e117815f5d6c8b
-
SSDEEP
12288:ZzqRr7IFX4WefDHgasZKx4xNOMfY33sUKpfcsFmcyou2F02W2QVM:u2X4ZLUZKxkXY33OpfPFmcyouwd8M
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/700-0-0x0000000000400000-0x00000000005AA000-memory.dmp upx behavioral1/memory/700-78-0x0000000000400000-0x00000000005AA000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 16bafa353d339b47f1bd491bf701819d.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 16bafa353d339b47f1bd491bf701819d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 16bafa353d339b47f1bd491bf701819d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 700 16bafa353d339b47f1bd491bf701819d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 700 16bafa353d339b47f1bd491bf701819d.exe 700 16bafa353d339b47f1bd491bf701819d.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5d965bd3c2f23beddfd4861ce1a2fe7d1
SHA1a0451e27022551de1b3238db21c68fb50b87b829
SHA256e7f0f13af02bdf00cb8ad7f80dd3903341fdb5ef2d76822e1bbc92cecaed4826
SHA512cec45d1bb2d10f13c8458c064e6b9b0540fc9b21a47bdd95ed69b6f184eb62d6bd1dfad16fa1519f4d91fcb7dc8e5668b0dc0dc5465c5320c470816f68d6f014
-
Filesize
92KB
MD55d9b8954c6786a7c0bb618b08be64a74
SHA1e08618a868a2c478074b8bcfef1150975121f7a9
SHA25614b90b5173ada88e13fc2634be7255ab933a0f44a9d497f0c74068e26e471f68
SHA512ea30a3d2538f1b8a342907fc146fc0ddca4a2c332d1027652cd01553f64518f6ee5a9ea4cebb7b9d0544df951ab175cdb74c69b13d48cc9be701968af3a4f3de
-
Filesize
89KB
MD5219073097031d9c1a95a1291d66f3a10
SHA12b7996b01d90b7f424f2a2e6063947461db4b2b2
SHA256232066e3f6f1351afdaee1acb70c409766641fd5669e0b55ce7c77fac0a857ef
SHA5129ad2745f96cf79a4d59393cc3fbb3958b244013f6798c12abe41e37fca80df3c7cedab4b47cbd197645c86b31077388ec8f01ea8d67c5feacbef95b1ae7582b5