Analysis
-
max time kernel
196s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2a24a0da851fb3b53649f40ea243dc2b.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a24a0da851fb3b53649f40ea243dc2b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
2a24a0da851fb3b53649f40ea243dc2b.exe
-
Size
25KB
-
MD5
2a24a0da851fb3b53649f40ea243dc2b
-
SHA1
be273c762ec04633bcb9711d3665dc53d32024f9
-
SHA256
769d759a1175664fd6760629260e66de729032c1d4d4521c57bb2722a6580886
-
SHA512
75ac3db1df1ac555a5eab6475d91079b9539043e852ad236bbfd5f01438dab89b59cc02b383072480b3087775430bcdff3e318788669b08613fd0c82035b76cc
-
SSDEEP
384:ez1A3LlOkYuOh1Oqrk2YxdY6jmVJ0xBRmh8rnCR8QF4U8wzE:eJA7EkYuHqk2YxdY6jmVJ0x8MnDU87
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B71D88C-C598-4935-C5D1-43AA4DB90836} 2a24a0da851fb3b53649f40ea243dc2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B71D88C-C598-4935-C5D1-43AA4DB90836}\stubpath = "C:\\Windows\\system32\\MSWin32.exe s" 2a24a0da851fb3b53649f40ea243dc2b.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Active Setup\Installed Components 2a24a0da851fb3b53649f40ea243dc2b.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSWin32.exe 2a24a0da851fb3b53649f40ea243dc2b.exe File created C:\Windows\SysWOW64\MSWin32.exe 2a24a0da851fb3b53649f40ea243dc2b.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 1240 2a24a0da851fb3b53649f40ea243dc2b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1240 wrote to memory of 3576 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 47 PID 1240 wrote to memory of 3576 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 47 PID 1240 wrote to memory of 4276 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 93 PID 1240 wrote to memory of 4276 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 93 PID 1240 wrote to memory of 4276 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 93 PID 1240 wrote to memory of 4276 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 93 PID 1240 wrote to memory of 4276 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 93 PID 1240 wrote to memory of 4276 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 93 PID 1240 wrote to memory of 3576 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 47 PID 1240 wrote to memory of 3576 1240 2a24a0da851fb3b53649f40ea243dc2b.exe 47
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\2a24a0da851fb3b53649f40ea243dc2b.exe"C:\Users\Admin\AppData\Local\Temp\2a24a0da851fb3b53649f40ea243dc2b.exe"2⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:4276
-
-