Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 20:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
02d5412706cbd797bf7363e8ed854445.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
02d5412706cbd797bf7363e8ed854445.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
02d5412706cbd797bf7363e8ed854445.exe
-
Size
124KB
-
MD5
02d5412706cbd797bf7363e8ed854445
-
SHA1
623a18959fe709d892469afeea53a288331ee6e4
-
SHA256
00d497c8f9171c28347d0e49f76c966d3ee38fae223d024c18d86e82118373e0
-
SHA512
3993fe40c82872a61eefad05bc6cfa34f70925bf44b67e71bb4fc07792b31429902ff2090f9c02552653bdfb273e17dfd52395cf8d19b879b9a49d910ba1a08d
-
SSDEEP
1536:uIkriknNWvWv7LLrR5Ddh8M2u2Y6sUnBpuHHqZpMwF0lJ9xDNwNqb:y5N0Wv/LNVz66qzfulJ9xDKK
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\Niko\IEXPLORE.EXE 02d5412706cbd797bf7363e8ed854445.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 3016 reg.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 940 wrote to memory of 1344 940 02d5412706cbd797bf7363e8ed854445.exe 19 PID 940 wrote to memory of 1344 940 02d5412706cbd797bf7363e8ed854445.exe 19 PID 940 wrote to memory of 1344 940 02d5412706cbd797bf7363e8ed854445.exe 19 PID 940 wrote to memory of 1344 940 02d5412706cbd797bf7363e8ed854445.exe 19 PID 1344 wrote to memory of 3016 1344 cmd.exe 18 PID 1344 wrote to memory of 3016 1344 cmd.exe 18 PID 1344 wrote to memory of 3016 1344 cmd.exe 18 PID 1344 wrote to memory of 3016 1344 cmd.exe 18 PID 1344 wrote to memory of 3008 1344 cmd.exe 17 PID 1344 wrote to memory of 3008 1344 cmd.exe 17 PID 1344 wrote to memory of 3008 1344 cmd.exe 17 PID 1344 wrote to memory of 3008 1344 cmd.exe 17 PID 1344 wrote to memory of 3008 1344 cmd.exe 17 PID 1344 wrote to memory of 3008 1344 cmd.exe 17 PID 1344 wrote to memory of 3008 1344 cmd.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\02d5412706cbd797bf7363e8ed854445.exe"C:\Users\Admin\AppData\Local\Temp\02d5412706cbd797bf7363e8ed854445.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Start.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1344
-
-
C:\Windows\SysWOW64\gpupdate.exegpupdate /force1⤵PID:3008
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations /v ModRiskFileTypes /t REG_SZ /d .exe /f1⤵
- Modifies registry key
PID:3016