Analysis
-
max time kernel
0s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 11:16
Behavioral task
behavioral1
Sample
16f0d8d8b884085c9d29b5cceb5e7572.exe
Resource
win7-20231215-en
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
16f0d8d8b884085c9d29b5cceb5e7572.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
16f0d8d8b884085c9d29b5cceb5e7572.exe
-
Size
123KB
-
MD5
16f0d8d8b884085c9d29b5cceb5e7572
-
SHA1
177cf0cd142199c0e4c9631140f35b4718d55221
-
SHA256
7e2ef463d38b2586633579e0f794753051ee0a8afd31b68c80a683cee88aba5f
-
SHA512
d1d8166f1001f45c7c745b382dc05d6cde51869666c5642005c8e5c085078d070436eeeda3229b451aa16538964d02e122f1c5cf6a618dfa9d244796d11b95e3
-
SSDEEP
3072:NeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLsqhFr6:NVYrJrOSsRwcpk
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 116 iaccess32.exe -
resource yara_rule behavioral2/memory/2760-0-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\iaccess32.exe 16f0d8d8b884085c9d29b5cceb5e7572.exe File created C:\Windows\tmlpcert2007 iaccess32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs regedit.exe 1 IoCs
pid Process 4832 regedit.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2760 16f0d8d8b884085c9d29b5cceb5e7572.exe 116 iaccess32.exe 116 iaccess32.exe 116 iaccess32.exe 116 iaccess32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2760 wrote to memory of 116 2760 16f0d8d8b884085c9d29b5cceb5e7572.exe 19 PID 2760 wrote to memory of 116 2760 16f0d8d8b884085c9d29b5cceb5e7572.exe 19 PID 2760 wrote to memory of 116 2760 16f0d8d8b884085c9d29b5cceb5e7572.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\16f0d8d8b884085c9d29b5cceb5e7572.exe"C:\Users\Admin\AppData\Local\Temp\16f0d8d8b884085c9d29b5cceb5e7572.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\iaccess32.exeC:\Windows\iaccess32.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:116
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3352
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\system32\egaccess4_1071.dll"1⤵PID:4384
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s C:\Windows\tmlpcert20071⤵
- Runs regedit.exe
PID:4832