Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24e2a342350c6bacaa93a19cf4140f1c.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
24e2a342350c6bacaa93a19cf4140f1c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
24e2a342350c6bacaa93a19cf4140f1c.exe
-
Size
11KB
-
MD5
24e2a342350c6bacaa93a19cf4140f1c
-
SHA1
1ed9d2bd28694c34274957abfbd3f4a26dcb87f1
-
SHA256
b32386c2a82be935dcd1d647dcea7e6de70edf93bf2359b0c92c98ae7f831ac5
-
SHA512
e786c47cc8e0346e8c0aa64fed532b044ef237b4a8cc20aa7aa5ce22d37ae6427e823a149eb586527e3210d7b33ee9cdea98b26caf49e642e1b2689cc3c0f73b
-
SSDEEP
192:og3zDi5xWEY6CpUlLONDtwgHeWGGg7DzgFU/CV58LpMX2iEZA/vYw4NrqcjOB:ogjDp5ZtATDX/CELpMX2p2/vYw4N7jOB
Score
8/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 24e2a342350c6bacaa93a19cf4140f1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\HFDF = "C:\\Windows\\system32\\hfdf0516.exe" 24e2a342350c6bacaa93a19cf4140f1c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfdf0516.dll 24e2a342350c6bacaa93a19cf4140f1c.exe File created C:\Windows\SysWOW64\test.sys 24e2a342350c6bacaa93a19cf4140f1c.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2292 2520 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2520 24e2a342350c6bacaa93a19cf4140f1c.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1244 2520 24e2a342350c6bacaa93a19cf4140f1c.exe 17 PID 2520 wrote to memory of 2292 2520 24e2a342350c6bacaa93a19cf4140f1c.exe 28 PID 2520 wrote to memory of 2292 2520 24e2a342350c6bacaa93a19cf4140f1c.exe 28 PID 2520 wrote to memory of 2292 2520 24e2a342350c6bacaa93a19cf4140f1c.exe 28 PID 2520 wrote to memory of 2292 2520 24e2a342350c6bacaa93a19cf4140f1c.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\24e2a342350c6bacaa93a19cf4140f1c.exe"C:\Users\Admin\AppData\Local\Temp\24e2a342350c6bacaa93a19cf4140f1c.exe"2⤵
- Adds policy Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 2523⤵
- Program crash
PID:2292
-
-