Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 20:12
Behavioral task
behavioral1
Sample
3a8708ada0725313413156933654b253.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
3a8708ada0725313413156933654b253.exe
-
Size
10KB
-
MD5
3a8708ada0725313413156933654b253
-
SHA1
17cc97a46d2b4473fbf1ba3756e689c0e172d8cf
-
SHA256
c260d28082eda0567eb8ee36ab2ce71952be172a7e94c2bf7c63032b82150c07
-
SHA512
fcf4d1e4ab1b3ad1706a8d1e56192fd40902b9f7ffabfc1d36a4a34e74a38a3bf4ebcbf809b79f07f3cadcea95175f83ee10101616075789b90c719c9c48338c
-
SSDEEP
192:cg/aCLOJXS0opLYpkbkuiD9oB1AHiUZKSqbWXhl:p/aCOw0opLYpkgHoL/qDqbWXhl
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1728-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1728-7-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ 3a8708ada0725313413156933654b253.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ 3a8708ada0725313413156933654b253.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\asgp32.ASGP\Clsid 3a8708ada0725313413156933654b253.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\asgp32.ASGP 3a8708ada0725313413156933654b253.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1728 3a8708ada0725313413156933654b253.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1728 3a8708ada0725313413156933654b253.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2696 1728 3a8708ada0725313413156933654b253.exe 28 PID 1728 wrote to memory of 2696 1728 3a8708ada0725313413156933654b253.exe 28 PID 1728 wrote to memory of 2696 1728 3a8708ada0725313413156933654b253.exe 28 PID 1728 wrote to memory of 2696 1728 3a8708ada0725313413156933654b253.exe 28 PID 1728 wrote to memory of 2696 1728 3a8708ada0725313413156933654b253.exe 28 PID 1728 wrote to memory of 2696 1728 3a8708ada0725313413156933654b253.exe 28 PID 1728 wrote to memory of 2696 1728 3a8708ada0725313413156933654b253.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a8708ada0725313413156933654b253.exe"C:\Users\Admin\AppData\Local\Temp\3a8708ada0725313413156933654b253.exe"1⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Windows\system32\asgp32.dll2⤵PID:2696
-