Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:02
Behavioral task
behavioral1
Sample
5e2791bebb29381b547e1b61e1fab167.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5e2791bebb29381b547e1b61e1fab167.exe
Resource
win10v2004-20231222-en
General
-
Target
5e2791bebb29381b547e1b61e1fab167.exe
-
Size
782KB
-
MD5
5e2791bebb29381b547e1b61e1fab167
-
SHA1
1b5a8882c483d0b6aede0c53b39b939f4e457e90
-
SHA256
978a25a2a0cc3a4bd47b21467597b668056b29df59fef00e19d1a7f1d449bd06
-
SHA512
2b495f961521cd2bf81cb8d337f5560ddc8610e73fc783b017b514f8adc6186c7d84f6f0f20c74aa790dba6c36c519f41ca498a780d8717589db5684da2410d5
-
SSDEEP
24576:LVeg5kh6D7xvcmy/GyYc9LPgjhzmrO8VPET7uB:LVeguGDwGyn9LPgtqiU6e
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2544-0-0x0000000000400000-0x00000000005E1000-memory.dmp upx behavioral1/memory/2544-194-0x0000000000400000-0x00000000005E1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 5e2791bebb29381b547e1b61e1fab167.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 5e2791bebb29381b547e1b61e1fab167.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main 5e2791bebb29381b547e1b61e1fab167.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2544 5e2791bebb29381b547e1b61e1fab167.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2544 5e2791bebb29381b547e1b61e1fab167.exe 2544 5e2791bebb29381b547e1b61e1fab167.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD512210c5c4d22a29ba5aa5a9dce3be980
SHA1a846d94130370099b77d9f469383f283591e3b33
SHA256d3feae909b667e7117cdca18f386fe70cfaf48d99286fa7d66a7157d385d275a
SHA51239d009cbc987d5f42728b6787dd3d03892a9360f3b39b8aa996322778749e48f3bd3112bec094a100ed22f974e15ef84ea3051512d9d4d648aa06e23f719ae3f
-
Filesize
10KB
MD5ce02e24d716599a4a5f84b645caeff22
SHA172dddea0318f17822f236b1e42b360c8af26ad0a
SHA2566159eddacb1fd977ef2d3aaaba4ebbb8540876068f4c72a08e2289ffaf1b7eb8
SHA5122e7db2a368a5e36bd2b02783a6021cd45a599f262f16e53bafb118fc04976c9f99c85059e1d92a08f56ed7680c169b3ce039eeec8d2f86009251ca6a595d8e12