Analysis
-
max time kernel
155s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24a19c78ba8a887f8c137d0e085029dc.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
24a19c78ba8a887f8c137d0e085029dc.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
24a19c78ba8a887f8c137d0e085029dc.exe
-
Size
28KB
-
MD5
24a19c78ba8a887f8c137d0e085029dc
-
SHA1
5bdcec24cd1d4f823c4df6300704dd982282f7fa
-
SHA256
4f9964aa90391c3802efe96ed2d3694ffdcbe40fe2b91bd6a06fcbc4afc0d792
-
SHA512
6750579438dfe7957873daa6cebf6501143bb03fba07e0ee41cdaaba25bdf5afd057425fce8979db2bfa6b3fe7f08762ac97c2eb2502e67c7e653e06bf5f682d
-
SSDEEP
384:/T3d0LDfihDXsYXKhuteG42szOD9Sz6zhDXs/f:/7d03yc+GceG4/4s+dc3
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4936 24a19c78ba8a887f8c137d0e085029dc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 3320 4936 24a19c78ba8a887f8c137d0e085029dc.exe 95 PID 4936 wrote to memory of 3320 4936 24a19c78ba8a887f8c137d0e085029dc.exe 95 PID 4936 wrote to memory of 3320 4936 24a19c78ba8a887f8c137d0e085029dc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\24a19c78ba8a887f8c137d0e085029dc.exe"C:\Users\Admin\AppData\Local\Temp\24a19c78ba8a887f8c137d0e085029dc.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen C:\Documents and Settings\All Users\Documentos\Minhas imagens\Amostras de imagens\Ninféias.jpg2⤵PID:3320
-