Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
070e7a6e4d9505d62b9b8ca8588d816b.exe
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
070e7a6e4d9505d62b9b8ca8588d816b.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
070e7a6e4d9505d62b9b8ca8588d816b.exe
-
Size
11KB
-
MD5
070e7a6e4d9505d62b9b8ca8588d816b
-
SHA1
b417d3f7b16d8abb327cac2c798a642b38bc1f40
-
SHA256
9c71d216ee5c98fbe623c33183eecddb75941d875308f04937ad4b409cb62b74
-
SHA512
dc0672214386ea1696ee81eb405f54c0d398f3a28a280c30d001fc667d3ff96f864eec66b6faa6d01a55bdd2cb86bf6a2e202fbdf5849d4894e39d2aee8cfb96
-
SSDEEP
192:q7W7o+yD2pC2rlDYDi3Y3VZGbhqiGRFumf1CQLolOygWEPySa1tHDYySyjM:qYoepCsD4zZGkpFuKLolOfT6uyPQ
Score
1/10
Malware Config
Signatures
-
Modifies registry class 10 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{565675C3-F02C-9A5D-41F1-31168D1DA148}\Data\ = 0000000050b360e900000000000000000000000000000000 070e7a6e4d9505d62b9b8ca8588d816b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{565675C3-F02C-9A5D-41F1-31168D1DA148} 070e7a6e4d9505d62b9b8ca8588d816b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{565675C3-F02C-9A5D-41F1-31168D1DA148}\LocalServer32 070e7a6e4d9505d62b9b8ca8588d816b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{565675C3-F02C-9A5D-41F1-31168D1DA148}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\070e7a6e4d9505d62b9b8ca8588d816b.exe" 070e7a6e4d9505d62b9b8ca8588d816b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{565675C3-F02C-9A5D-41F1-31168D1DA148}\Data 070e7a6e4d9505d62b9b8ca8588d816b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{565675C3-F02C-9A5D-41F1-31168D1DA148}\Data\ = 0000000050b360e900000000000000000000000000000000 070e7a6e4d9505d62b9b8ca8588d816b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{565675C3-F02C-9A5D-41F1-31168D1DA148} 070e7a6e4d9505d62b9b8ca8588d816b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{565675C3-F02C-9A5D-41F1-31168D1DA148}\LocalServer32 070e7a6e4d9505d62b9b8ca8588d816b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{565675C3-F02C-9A5D-41F1-31168D1DA148}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\070e7a6e4d9505d62b9b8ca8588d816b.exe" 070e7a6e4d9505d62b9b8ca8588d816b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{565675C3-F02C-9A5D-41F1-31168D1DA148}\Data 070e7a6e4d9505d62b9b8ca8588d816b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\070e7a6e4d9505d62b9b8ca8588d816b.exe"C:\Users\Admin\AppData\Local\Temp\070e7a6e4d9505d62b9b8ca8588d816b.exe"1⤵
- Modifies registry class
PID:1068
-
C:\Users\Admin\AppData\Local\Temp\070e7a6e4d9505d62b9b8ca8588d816b.exe"C:\Users\Admin\AppData\Local\Temp\070e7a6e4d9505d62b9b8ca8588d816b.exe" /s1⤵
- Modifies registry class
PID:2140