Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 06:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5896df5af363c65342408d4947798a22.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
5896df5af363c65342408d4947798a22.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
5896df5af363c65342408d4947798a22.exe
-
Size
112KB
-
MD5
5896df5af363c65342408d4947798a22
-
SHA1
d74696a5af572f5cdf69a39d13a9661408041091
-
SHA256
e4eabf21c7cf9ac1b6ed04acb9f28f33eb2a4e07741355f8e1b0e596d88be3d1
-
SHA512
14f877893d5501188f41fa4efcb2bba2ac3ccabba2b73e62df30a62dce55709848f6c411906a12dabe923da4f6086cd4e9d2cbf2e1ca8d70cda3a5cfbf3b0b0c
-
SSDEEP
3072:PKq5ZD3JfroJuvmYyRTFuXyf/+fj+xoe+2:FzSzqnh
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\DAP Cleanup = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5896df5af363c65342408d4947798a22.exe /CLEANUP /DIR=\"C:\\Users\\Admin\\AppData\\Local\\Temp\"" 5896df5af363c65342408d4947798a22.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\Content Type = "message/rfc822" 5896df5af363c65342408d4947798a22.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 688 5896df5af363c65342408d4947798a22.exe 4552 5896df5af363c65342408d4947798a22.exe 4552 5896df5af363c65342408d4947798a22.exe 4552 5896df5af363c65342408d4947798a22.exe 4552 5896df5af363c65342408d4947798a22.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 688 wrote to memory of 4552 688 5896df5af363c65342408d4947798a22.exe 16 PID 688 wrote to memory of 4552 688 5896df5af363c65342408d4947798a22.exe 16 PID 688 wrote to memory of 4552 688 5896df5af363c65342408d4947798a22.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\5896df5af363c65342408d4947798a22.exe"C:\Users\Admin\AppData\Local\Temp\5896df5af363c65342408d4947798a22.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\5896df5af363c65342408d4947798a22.exeC:\Users\Admin\AppData\Local\Temp\5896df5af363c65342408d4947798a22.exe /TEMP DIR="C:\Users\Admin\AppData\Local\Temp"2⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4552
-