Analysis
-
max time kernel
26s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 22:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fb4d81660045eb7432ade6adf20c3385.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
fb4d81660045eb7432ade6adf20c3385.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
fb4d81660045eb7432ade6adf20c3385.exe
-
Size
200KB
-
MD5
fb4d81660045eb7432ade6adf20c3385
-
SHA1
2ef72289927b09778516474b194e78d43467cfda
-
SHA256
5cd4ef16b0c4009cdc01d9d7c493c22008ca29834b3748582781297be4624f27
-
SHA512
c7bbce9e476842a60d537ce3ecf76869627f334f2158c1891ef041e73d233f314a86e3071c9a221d1152e72bb6acdffe87d08a725a8f6f4078b52ec5c71de79e
-
SSDEEP
6144:k50zTTCTee2f2cKpFynL/w6Nz40VCk0unquc6LdMjB:G0BKpUnTw6NziF
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E7CAADA6-66CA-ABC1-366A-E35E125B9CB8} fb4d81660045eb7432ade6adf20c3385.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E7CAADA6-66CA-ABC1-366A-E35E125B9CB8}\stubpath = "%SystemRoot%\\system32\\V3Medic.exe" fb4d81660045eb7432ade6adf20c3385.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\V3Medic.exe fb4d81660045eb7432ade6adf20c3385.exe File opened for modification C:\Windows\SysWOW64\V3Medic.exe fb4d81660045eb7432ade6adf20c3385.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1992 1940 fb4d81660045eb7432ade6adf20c3385.exe 22 PID 1940 wrote to memory of 1992 1940 fb4d81660045eb7432ade6adf20c3385.exe 22 PID 1940 wrote to memory of 1992 1940 fb4d81660045eb7432ade6adf20c3385.exe 22 PID 1940 wrote to memory of 1992 1940 fb4d81660045eb7432ade6adf20c3385.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb4d81660045eb7432ade6adf20c3385.exe"C:\Users\Admin\AppData\Local\Temp\fb4d81660045eb7432ade6adf20c3385.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{E7CAADA6-66CA-ABC1-366A-E35E125B9CB8}" /f2⤵PID:1992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\FB4D81~1.EXE > nul2⤵PID:3032
-