Analysis
-
max time kernel
97s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 18:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
34733ab9822c64882c409c39bf36a650.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
34733ab9822c64882c409c39bf36a650.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
34733ab9822c64882c409c39bf36a650.exe
-
Size
1003KB
-
MD5
34733ab9822c64882c409c39bf36a650
-
SHA1
c2569c9eafc6de550a6abf4674e556616656157b
-
SHA256
7846ed14e7153ec0bc206dd05b28a87c680ecbe8578979c571dadf99c8da9000
-
SHA512
61264992a545802b64a9f672e9c28c4ea19b2462e804dd9870b64cfb6162a74cb07009d8a2cdd696a54da81bc966b68a21ce754a371933c9ef12e057459ef6f6
-
SSDEEP
24576:/UMmvGcGS6OB7Agcy0bp1JhuFLYRcAcgf2hzp3ig8ARvDd:/UMEGrS6A7AgcZl1GF84g6ia
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3bf41072-b2b1-21c1-b5c1-0305f4155515} 34733ab9822c64882c409c39bf36a650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\DzServer.exe" 34733ab9822c64882c409c39bf36a650.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\DzServer.exe 34733ab9822c64882c409c39bf36a650.exe File created C:\Windows\DzServer.exe 34733ab9822c64882c409c39bf36a650.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4968 3484 34733ab9822c64882c409c39bf36a650.exe 90 PID 3484 wrote to memory of 4968 3484 34733ab9822c64882c409c39bf36a650.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\34733ab9822c64882c409c39bf36a650.exe"C:\Users\Admin\AppData\Local\Temp\34733ab9822c64882c409c39bf36a650.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" ¨Á2⤵PID:4968
-