Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 00:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4678b9692aa2e316e3cca8db2fe3d414.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4678b9692aa2e316e3cca8db2fe3d414.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
4678b9692aa2e316e3cca8db2fe3d414.exe
-
Size
706KB
-
MD5
4678b9692aa2e316e3cca8db2fe3d414
-
SHA1
afb9659fb8dfc785c8d126b5d7324864948cde04
-
SHA256
dc25b560f7131e431e872cfbaeb47a34dd2e11a6fc2040535e232be307be687e
-
SHA512
2368f459bbc4f6a43ae8b641fe7b45b589c263e3d406b0274742f8d97192aa2bd5fe8b90e4e6fc3cc940a2b01bce98a4763d544fd6d2a2fa0a7883a1e4091e32
-
SSDEEP
12288:/jumzzhnl5Cvm/Zh6cLtyXDEmwszL8H+IYjYakyMWmQsGIIagxc0IKtcySim6tR7:rp3Cvm/Zh6cByXwsf8H0nMWmQsIagc09
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Picasa Check = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4678b9692aa2e316e3cca8db2fe3d414.exe" 4678b9692aa2e316e3cca8db2fe3d414.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\arquivos comuns\picasa check\picasacheck.exe 4678b9692aa2e316e3cca8db2fe3d414.exe File opened for modification C:\Program Files (x86)\arquivos comuns\picasa check\ 4678b9692aa2e316e3cca8db2fe3d414.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\media\mp3\ 4678b9692aa2e316e3cca8db2fe3d414.exe File created C:\Windows\media\NewIcon.ico 4678b9692aa2e316e3cca8db2fe3d414.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3948 4678b9692aa2e316e3cca8db2fe3d414.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3948 4678b9692aa2e316e3cca8db2fe3d414.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4678b9692aa2e316e3cca8db2fe3d414.exe"C:\Users\Admin\AppData\Local\Temp\4678b9692aa2e316e3cca8db2fe3d414.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
PID:3948