Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24a19c78ba8a887f8c137d0e085029dc.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
24a19c78ba8a887f8c137d0e085029dc.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
24a19c78ba8a887f8c137d0e085029dc.exe
-
Size
28KB
-
MD5
24a19c78ba8a887f8c137d0e085029dc
-
SHA1
5bdcec24cd1d4f823c4df6300704dd982282f7fa
-
SHA256
4f9964aa90391c3802efe96ed2d3694ffdcbe40fe2b91bd6a06fcbc4afc0d792
-
SHA512
6750579438dfe7957873daa6cebf6501143bb03fba07e0ee41cdaaba25bdf5afd057425fce8979db2bfa6b3fe7f08762ac97c2eb2502e67c7e653e06bf5f682d
-
SSDEEP
384:/T3d0LDfihDXsYXKhuteG42szOD9Sz6zhDXs/f:/7d03yc+GceG4/4s+dc3
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2436 24a19c78ba8a887f8c137d0e085029dc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2200 2436 24a19c78ba8a887f8c137d0e085029dc.exe 28 PID 2436 wrote to memory of 2200 2436 24a19c78ba8a887f8c137d0e085029dc.exe 28 PID 2436 wrote to memory of 2200 2436 24a19c78ba8a887f8c137d0e085029dc.exe 28 PID 2436 wrote to memory of 2200 2436 24a19c78ba8a887f8c137d0e085029dc.exe 28 PID 2436 wrote to memory of 2200 2436 24a19c78ba8a887f8c137d0e085029dc.exe 28 PID 2436 wrote to memory of 2200 2436 24a19c78ba8a887f8c137d0e085029dc.exe 28 PID 2436 wrote to memory of 2200 2436 24a19c78ba8a887f8c137d0e085029dc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\24a19c78ba8a887f8c137d0e085029dc.exe"C:\Users\Admin\AppData\Local\Temp\24a19c78ba8a887f8c137d0e085029dc.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen C:\Documents and Settings\All Users\Documentos\Minhas imagens\Amostras de imagens\Ninféias.jpg2⤵PID:2200
-