Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 05:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2a24a0da851fb3b53649f40ea243dc2b.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a24a0da851fb3b53649f40ea243dc2b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
2a24a0da851fb3b53649f40ea243dc2b.exe
-
Size
25KB
-
MD5
2a24a0da851fb3b53649f40ea243dc2b
-
SHA1
be273c762ec04633bcb9711d3665dc53d32024f9
-
SHA256
769d759a1175664fd6760629260e66de729032c1d4d4521c57bb2722a6580886
-
SHA512
75ac3db1df1ac555a5eab6475d91079b9539043e852ad236bbfd5f01438dab89b59cc02b383072480b3087775430bcdff3e318788669b08613fd0c82035b76cc
-
SSDEEP
384:ez1A3LlOkYuOh1Oqrk2YxdY6jmVJ0xBRmh8rnCR8QF4U8wzE:eJA7EkYuHqk2YxdY6jmVJ0x8MnDU87
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9B71D88C-C598-4935-C5D1-43AA4DB90836} 2a24a0da851fb3b53649f40ea243dc2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9B71D88C-C598-4935-C5D1-43AA4DB90836}\stubpath = "C:\\Windows\\system32\\MSWin32.exe s" 2a24a0da851fb3b53649f40ea243dc2b.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Active Setup\Installed Components 2a24a0da851fb3b53649f40ea243dc2b.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\MSWin32.exe 2a24a0da851fb3b53649f40ea243dc2b.exe File opened for modification C:\Windows\SysWOW64\MSWin32.exe 2a24a0da851fb3b53649f40ea243dc2b.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 1216 2a24a0da851fb3b53649f40ea243dc2b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1216 wrote to memory of 1384 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 7 PID 1216 wrote to memory of 1384 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 7 PID 1216 wrote to memory of 1996 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 16 PID 1216 wrote to memory of 1996 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 16 PID 1216 wrote to memory of 1996 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 16 PID 1216 wrote to memory of 1996 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 16 PID 1216 wrote to memory of 1996 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 16 PID 1216 wrote to memory of 1996 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 16 PID 1216 wrote to memory of 1996 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 16 PID 1216 wrote to memory of 1996 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 16 PID 1216 wrote to memory of 1384 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 7 PID 1216 wrote to memory of 1384 1216 2a24a0da851fb3b53649f40ea243dc2b.exe 7
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\2a24a0da851fb3b53649f40ea243dc2b.exe"C:\Users\Admin\AppData\Local\Temp\2a24a0da851fb3b53649f40ea243dc2b.exe"2⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1996
-
-