Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 18:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
00ae3d143c01a6878506df2fa3ecd7bd.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
00ae3d143c01a6878506df2fa3ecd7bd.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
00ae3d143c01a6878506df2fa3ecd7bd.exe
-
Size
122KB
-
MD5
00ae3d143c01a6878506df2fa3ecd7bd
-
SHA1
f7a2e2a318a97c77cc813f34d3731220ecf1da62
-
SHA256
35e6921c086f2bae684d1ebd8d431b3d36c3ccd20637ee890d06ba985ed9467e
-
SHA512
2ed40b3b70f8abe753b61e2b061374e23aae2bf7680d3d52935505c4e796706bfee736c6973fbf9a1ed620a313d8bea653141f75a00b875df3b39ff6461fba89
-
SSDEEP
3072:u8U2yJN5f661xRZbALxB1Ojdgx8GYgSTJK5bJk9:u8U2qy6rRZb7jxGYgSTJGJI
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Serverx = "C:\\Windows\\system32\\Serverx.exe" 00ae3d143c01a6878506df2fa3ecd7bd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Serverx.exe 00ae3d143c01a6878506df2fa3ecd7bd.exe File opened for modification C:\Windows\SysWOW64\Serverx.exe 00ae3d143c01a6878506df2fa3ecd7bd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 00ae3d143c01a6878506df2fa3ecd7bd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2664 00ae3d143c01a6878506df2fa3ecd7bd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2664 00ae3d143c01a6878506df2fa3ecd7bd.exe 2664 00ae3d143c01a6878506df2fa3ecd7bd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2664 2760 00ae3d143c01a6878506df2fa3ecd7bd.exe 28 PID 2760 wrote to memory of 2664 2760 00ae3d143c01a6878506df2fa3ecd7bd.exe 28 PID 2760 wrote to memory of 2664 2760 00ae3d143c01a6878506df2fa3ecd7bd.exe 28 PID 2760 wrote to memory of 2664 2760 00ae3d143c01a6878506df2fa3ecd7bd.exe 28 PID 2760 wrote to memory of 1208 2760 00ae3d143c01a6878506df2fa3ecd7bd.exe 23 PID 2760 wrote to memory of 1208 2760 00ae3d143c01a6878506df2fa3ecd7bd.exe 23
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\00ae3d143c01a6878506df2fa3ecd7bd.exe"C:\Users\Admin\AppData\Local\Temp\00ae3d143c01a6878506df2fa3ecd7bd.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\00ae3d143c01a6878506df2fa3ecd7bd.exe"C:\Users\Admin\AppData\Local\Temp\00ae3d143c01a6878506df2fa3ecd7bd.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2664
-
-