Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 16:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2c19d54c77b3d825fe279f28606d599b.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
2c19d54c77b3d825fe279f28606d599b.exe
-
Size
719KB
-
MD5
2c19d54c77b3d825fe279f28606d599b
-
SHA1
b4543fee3ab2c7f99a586decc6fbbc2d964acbd1
-
SHA256
e1edfbd0a1c8436a6e9afa73f29ccc84c5ec97e42753f2e594be183190dd8f8c
-
SHA512
2407f385841813ba0c334bc186f7c0bc556f9c26f0e5c324d5cd49cefefa35b3338e2d4f44a35a8073e06537f1284fb166e2433284a313855fa6f88392d7d869
-
SSDEEP
12288:a8KbyYgzl6QzKUdM48wvZ8zuQ3Msy96dMJYHiCThnu5EsP:aXy9tzKUd58mZ8zl3Msy96dMJyi8hng
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2c19d54c77b3d825fe279f28606d599b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 2c19d54c77b3d825fe279f28606d599b.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 2c19d54c77b3d825fe279f28606d599b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 2c19d54c77b3d825fe279f28606d599b.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 2c19d54c77b3d825fe279f28606d599b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2480 2c19d54c77b3d825fe279f28606d599b.exe 2480 2c19d54c77b3d825fe279f28606d599b.exe