Analysis
-
max time kernel
151s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 09:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
13fb0923ce3416036a2d3f34c6496088.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
13fb0923ce3416036a2d3f34c6496088.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
13fb0923ce3416036a2d3f34c6496088.exe
-
Size
196KB
-
MD5
13fb0923ce3416036a2d3f34c6496088
-
SHA1
1d7bbcfa048572362c5cf7e8752e295e1cae09bc
-
SHA256
f742426afb121882f9468fdb119e127b7180a91224c3239615bef98ee57c3818
-
SHA512
65ca4bb285de44dd4e9e6735408a57a85a0e448e33e7aa89a1918cb82e1c67b03cb5346152ae06d7a37ab413fd12d462a8548b902f26fd8e566fc630586c466c
-
SSDEEP
1536:r0OQVgd54vZ2YS2mwQvuZqyTLghBFB6jc54vTgzQ:r0OL77YS8Q0qyTLgh2Kdz
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System32 = "C:\\Windows\\system32\\pc helth.exe" 13fb0923ce3416036a2d3f34c6496088.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\pc helth.exe" 13fb0923ce3416036a2d3f34c6496088.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\I: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\S: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\U: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\Y: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\B: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\H: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\J: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\M: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\N: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\P: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\V: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\T: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\W: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\X: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\A: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\G: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\K: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\L: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\O: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\Q: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\R: 13fb0923ce3416036a2d3f34c6496088.exe File opened (read-only) \??\Z: 13fb0923ce3416036a2d3f34c6496088.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3844 13fb0923ce3416036a2d3f34c6496088.exe