Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
38fb122c5ec9a92e354f353aa3d23e42.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
38fb122c5ec9a92e354f353aa3d23e42.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
38fb122c5ec9a92e354f353aa3d23e42.exe
-
Size
354KB
-
MD5
38fb122c5ec9a92e354f353aa3d23e42
-
SHA1
07c5adb7a335e0f030dda473dc99ade4167ae817
-
SHA256
1514b84ee4a70b12d644b251e7aaaa74d5431aef69afcc2ae647a3dfd8ee3755
-
SHA512
89d282ccc1c20745b880adf8ac09d7924058f3e16c9d7de4a27599cc42d277eec6d1edd799ef10c28e5737357fb5e537916174e2147d660bda18df7f7c78bd88
-
SSDEEP
6144:LUCPwgA+bcw4/ZsglzKkXpJsr1OZ3MrsHWdQ7vq0ivaMq:LQR+AzZsg1LX7sr1geQ7v9vM
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" 38fb122c5ec9a92e354f353aa3d23e42.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\runouce.exe 38fb122c5ec9a92e354f353aa3d23e42.exe File created C:\Windows\SysWOW64\runouce.exe 38fb122c5ec9a92e354f353aa3d23e42.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1944 wrote to memory of 3068 1944 38fb122c5ec9a92e354f353aa3d23e42.exe 28 PID 1944 wrote to memory of 3068 1944 38fb122c5ec9a92e354f353aa3d23e42.exe 28 PID 1944 wrote to memory of 3068 1944 38fb122c5ec9a92e354f353aa3d23e42.exe 28 PID 1944 wrote to memory of 3068 1944 38fb122c5ec9a92e354f353aa3d23e42.exe 28 PID 1944 wrote to memory of 1196 1944 38fb122c5ec9a92e354f353aa3d23e42.exe 12 PID 1944 wrote to memory of 1196 1944 38fb122c5ec9a92e354f353aa3d23e42.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\38fb122c5ec9a92e354f353aa3d23e42.exe"C:\Users\Admin\AppData\Local\Temp\38fb122c5ec9a92e354f353aa3d23e42.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\38fb122c5ec9a92e354f353aa3d23e42.exe"C:\Users\Admin\AppData\Local\Temp\38fb122c5ec9a92e354f353aa3d23e42.exe"3⤵PID:3068
-
-