Analysis
-
max time kernel
0s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
09aed888a1b9948445ca3381d2e28a73.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
09aed888a1b9948445ca3381d2e28a73.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
09aed888a1b9948445ca3381d2e28a73.exe
-
Size
161KB
-
MD5
09aed888a1b9948445ca3381d2e28a73
-
SHA1
c9c9bd8d8c33808e3393545535cbffd51449de34
-
SHA256
27c547645d52ed1be6edc197eb8864ae440ade8644ea5e59b4044e350299906b
-
SHA512
6fd5ec073500a50e36eb2471aaf91da6f1a47dfcee15058341d69d42d2c2f6c1c5a4378cda3f3eadf37864e541c9c4cfcf05e6f571079e6450af289bf41d182a
-
SSDEEP
3072:z10NdDS0QFGliOZotj+L+agq/DzVtZK4Xza2SF/BA4G4z+m:6G0aKiCfn5/AeWPtb
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\YVIBBBHA8C = "C:\\Users\\Admin\\AppData\\Local\\Temp\\09aed888a1b9948445ca3381d2e28a73.exe" 09aed888a1b9948445ca3381d2e28a73.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2224 09aed888a1b9948445ca3381d2e28a73.exe 1700 09aed888a1b9948445ca3381d2e28a73.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1700 2224 09aed888a1b9948445ca3381d2e28a73.exe 16 PID 2224 wrote to memory of 1700 2224 09aed888a1b9948445ca3381d2e28a73.exe 16 PID 2224 wrote to memory of 1700 2224 09aed888a1b9948445ca3381d2e28a73.exe 16 PID 2224 wrote to memory of 1700 2224 09aed888a1b9948445ca3381d2e28a73.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\09aed888a1b9948445ca3381d2e28a73.exe"C:\Users\Admin\AppData\Local\Temp\09aed888a1b9948445ca3381d2e28a73.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\09aed888a1b9948445ca3381d2e28a73.exeC:\Users\Admin\AppData\Local\Temp\09aed888a1b9948445ca3381d2e28a73.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1700
-