Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
75c6cc664dde0d0dc431486af87cddb0.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
75c6cc664dde0d0dc431486af87cddb0.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
75c6cc664dde0d0dc431486af87cddb0.exe
-
Size
166KB
-
MD5
75c6cc664dde0d0dc431486af87cddb0
-
SHA1
d73c96ba3a3f396bf8f6d3ddc748a31c924c474b
-
SHA256
dd32a7cc39ac3d44e0ec4d92fad16c445df7d05d6bd58f28f9c5026d8a392057
-
SHA512
077a9febf9e0aae742a139d4d475a71da423718e595ad616b952a85a0f3b3bc97e406c3805d7e86bbfac1046ec0a0cceb847e6594ecb75aea331e8f1959d9696
-
SSDEEP
3072:TSjdyPt7LmjY5BQfo93kKA6mOtHI/23BgRaweFlW93EyP66dY1s0X0XdVbCIqo:hmjCxApOO/Nk/0NEKNdY1aLbCVo
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\0ESKOMO9JO = "C:\\Users\\Admin\\AppData\\Local\\Temp\\75c6cc664dde0d0dc431486af87cddb0.exe" 75c6cc664dde0d0dc431486af87cddb0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job 75c6cc664dde0d0dc431486af87cddb0.exe File opened for modification C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job 75c6cc664dde0d0dc431486af87cddb0.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main 75c6cc664dde0d0dc431486af87cddb0.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International 75c6cc664dde0d0dc431486af87cddb0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2504 75c6cc664dde0d0dc431486af87cddb0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2504 75c6cc664dde0d0dc431486af87cddb0.exe 2504 75c6cc664dde0d0dc431486af87cddb0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75c6cc664dde0d0dc431486af87cddb0.exe"C:\Users\Admin\AppData\Local\Temp\75c6cc664dde0d0dc431486af87cddb0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2504