Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 06:57
Behavioral task
behavioral1
Sample
1195301f86aae2f396c9555e5420f4eb.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1195301f86aae2f396c9555e5420f4eb.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
1195301f86aae2f396c9555e5420f4eb.exe
-
Size
2.1MB
-
MD5
1195301f86aae2f396c9555e5420f4eb
-
SHA1
42f5730b23a2238735f810121e2ad937cb4c4e2e
-
SHA256
7a41b9c965539693cdfcf4fcd5941408ec5e5d21f0f672ed87c8d01c85a55aaa
-
SHA512
a773e171ed387a68671fbf305b08263a1bd032107f5812d8a9238303ed0ccaec1cc35095959eeec6d94e8cefc4c6befa07a90b9c0d0464f607d8a25368bc8bc5
-
SSDEEP
49152:kA4rpjNXeWeaAG+tPBtXND8n+IbeLN1/rVHgxwCdERlvSJ55i3ll:/4rdBeWePG+pz13IbeLvjV2wuERYD43l
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1812-1-0x0000000000400000-0x000000000101A000-memory.dmp upx behavioral1/memory/1812-3-0x0000000000400000-0x000000000101A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\system\\svchost.exe" 1195301f86aae2f396c9555e5420f4eb.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2180 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1812 1195301f86aae2f396c9555e5420f4eb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2180 1812 1195301f86aae2f396c9555e5420f4eb.exe 16 PID 1812 wrote to memory of 2180 1812 1195301f86aae2f396c9555e5420f4eb.exe 16 PID 1812 wrote to memory of 2180 1812 1195301f86aae2f396c9555e5420f4eb.exe 16 PID 1812 wrote to memory of 2180 1812 1195301f86aae2f396c9555e5420f4eb.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\1195301f86aae2f396c9555e5420f4eb.exe"C:\Users\Admin\AppData\Local\Temp\1195301f86aae2f396c9555e5420f4eb.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Limpeza" /tr c:\autoexec.bat /sc onstart /ru "System"2⤵
- Creates scheduled task(s)
PID:2180
-