Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f7ee5682e7a19e99552ba146a3fa4da8.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
f7ee5682e7a19e99552ba146a3fa4da8.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
f7ee5682e7a19e99552ba146a3fa4da8.exe
-
Size
88KB
-
MD5
f7ee5682e7a19e99552ba146a3fa4da8
-
SHA1
4c7bf218f8d919c03f27dd8fb6971194645f10da
-
SHA256
8dfeff8f36284fe139b4bc6fed3e66006d41574fc684230a10d9d6bc93dc20bd
-
SHA512
436a1e3400c4e5fa7968d12d0df2da21937e6fe69d22ca5001e4c72b45ee9c669a1952351cce020930383436b31c432ab1aabdc59b777d4f6e191b3f211393bc
-
SSDEEP
1536:IAVDyvSFEU6crB2sHrT16bs0Hd1Q9vSBvHEU66lDyv:R1rBxHrT1Es0Hd1ivSBvH
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main f7ee5682e7a19e99552ba146a3fa4da8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 f7ee5682e7a19e99552ba146a3fa4da8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2824 f7ee5682e7a19e99552ba146a3fa4da8.exe 2824 f7ee5682e7a19e99552ba146a3fa4da8.exe 2824 f7ee5682e7a19e99552ba146a3fa4da8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2804 2824 f7ee5682e7a19e99552ba146a3fa4da8.exe 31 PID 2824 wrote to memory of 2804 2824 f7ee5682e7a19e99552ba146a3fa4da8.exe 31 PID 2824 wrote to memory of 2804 2824 f7ee5682e7a19e99552ba146a3fa4da8.exe 31 PID 2824 wrote to memory of 2804 2824 f7ee5682e7a19e99552ba146a3fa4da8.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7ee5682e7a19e99552ba146a3fa4da8.exe"C:\Users\Admin\AppData\Local\Temp\f7ee5682e7a19e99552ba146a3fa4da8.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Admin\AppData\Local\Temp&del /q *.vbe2⤵PID:2804
-