Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 07:58
Behavioral task
behavioral1
Sample
5df622d680a82a9aff8e33cfcd1edf7e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5df622d680a82a9aff8e33cfcd1edf7e.exe
Resource
win10v2004-20231215-en
General
-
Target
5df622d680a82a9aff8e33cfcd1edf7e.exe
-
Size
75KB
-
MD5
5df622d680a82a9aff8e33cfcd1edf7e
-
SHA1
e7442d89109d31d522523543d88853ee67bb3676
-
SHA256
dbaa22e257a42ff64efc0652b06a5394be91322c75d48f2f4a54f65840e49b05
-
SHA512
5a14b80b3168a5f06af7048f7cceeacb061d7d1f1cf6a9bb71874fe13f383fab40e16dd571858670ede9c7232792bb8f74b68a5013d992969bbcf89d3b007c34
-
SSDEEP
1536:f84b/a7SodA5ZCgWfOCth4883JgDCS2R1dV9x0PHa2/hc10E6/nouy85MJ:f842GmqCLfOs2lcCS279qi4h+kvout5E
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3044-0-0x00000000002F0000-0x000000000032D000-memory.dmp upx behavioral1/memory/3044-3-0x00000000002F0000-0x000000000032D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\0a0608120209014d061b06 = "C:\\Users\\Admin\\AppData\\Roaming\\qajb.exe" 5df622d680a82a9aff8e33cfcd1edf7e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main 5df622d680a82a9aff8e33cfcd1edf7e.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 5df622d680a82a9aff8e33cfcd1edf7e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 5df622d680a82a9aff8e33cfcd1edf7e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3044 5df622d680a82a9aff8e33cfcd1edf7e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3044 5df622d680a82a9aff8e33cfcd1edf7e.exe 3044 5df622d680a82a9aff8e33cfcd1edf7e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df622d680a82a9aff8e33cfcd1edf7e.exe"C:\Users\Admin\AppData\Local\Temp\5df622d680a82a9aff8e33cfcd1edf7e.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:3044