Analysis
-
max time kernel
5s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d83d21e2d244d55093bed40f8d97a0e.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d83d21e2d244d55093bed40f8d97a0e.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
0d83d21e2d244d55093bed40f8d97a0e.exe
-
Size
747KB
-
MD5
0d83d21e2d244d55093bed40f8d97a0e
-
SHA1
9cb27d66b2cc3c4c32eafc7719fa9295f021d504
-
SHA256
3aeeb72968384058fea0ed8d3e8213016351f5a96eba915e85cc7048960fa51b
-
SHA512
24c8eb0536bd2fa7c80bda38c52aca4eae56ddc90aff1c102e3234897eb6a73503dd4a2ffbb8d291d98eb11b938764628f4dd9168b7a002b6bcc536855ef27b4
-
SSDEEP
12288:MI3paJM8+PrXuJnnxnkNW9/9XypizaHVd1lO4kZZfo3mAbc3:VZaJ/+jinnxnkNW9/9XS8aPbO4kE3m
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\AnyVideoSoftware.AnyVideoPlayer.playlist\ = "Playlist" 0d83d21e2d244d55093bed40f8d97a0e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Wow6432Node 0d83d21e2d244d55093bed40f8d97a0e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Wow6432Node\CLSID\{ACBF78C8-3876-406d-8067-B7E97AA29B01}\ = 9d89bbb29cbf91ad9db08daa9db095afce86ccb29d8699b299af94cace86cbca9bcc9db29ccd9dad9bcc919f9d9598cb9d86becf99bf91b3ce86cbcb9886c8ad98cd98cd9995919f9c968ccf9b968ccc9cbf91ae9c89bbd1ce86a79f9d96c8b29bcd88cf9dbfc89f 0d83d21e2d244d55093bed40f8d97a0e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\AnyVideoSoftware.AnyVideoPlayer.playlist\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0d83d21e2d244d55093bed40f8d97a0e.exe,1" 0d83d21e2d244d55093bed40f8d97a0e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Wow6432Node\CLSID\{ACBF78C8-3876-406d-8067-B7E97AA29B01} 0d83d21e2d244d55093bed40f8d97a0e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\AnyVideoSoftware.AnyVideoPlayer.playlist 0d83d21e2d244d55093bed40f8d97a0e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\AnyVideoSoftware.AnyVideoPlayer.playlist\DefaultIcon 0d83d21e2d244d55093bed40f8d97a0e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\AnyVideoSoftware.AnyVideoPlayer.playlist\shell\open\command 0d83d21e2d244d55093bed40f8d97a0e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\AnyVideoSoftware.AnyVideoPlayer.playlist\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\0d83d21e2d244d55093bed40f8d97a0e.exe\" \"%1\"" 0d83d21e2d244d55093bed40f8d97a0e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\AnyVideoSoftware.AnyVideoPlayer.playlist\shell 0d83d21e2d244d55093bed40f8d97a0e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\AnyVideoSoftware.AnyVideoPlayer.playlist\shell\open 0d83d21e2d244d55093bed40f8d97a0e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.playlist 0d83d21e2d244d55093bed40f8d97a0e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.playlist\ = "AnyVideoSoftware.AnyVideoPlayer.playlist" 0d83d21e2d244d55093bed40f8d97a0e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Wow6432Node\CLSID 0d83d21e2d244d55093bed40f8d97a0e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3024 0d83d21e2d244d55093bed40f8d97a0e.exe 3024 0d83d21e2d244d55093bed40f8d97a0e.exe 3024 0d83d21e2d244d55093bed40f8d97a0e.exe