Analysis
-
max time kernel
41s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2c4ba683289f711486a2ce38ddcdb523.exe
Resource
win7-20231129-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c4ba683289f711486a2ce38ddcdb523.exe
Resource
win10v2004-20231215-en
11 signatures
150 seconds
General
-
Target
2c4ba683289f711486a2ce38ddcdb523.exe
-
Size
366KB
-
MD5
2c4ba683289f711486a2ce38ddcdb523
-
SHA1
3a13f27bf8216b3eb48ca15fca56b9b70475dd39
-
SHA256
123fb39a88c24e9d8b35f735b198f42ad97a82a88e49788448f48854046df383
-
SHA512
138052b78289c10524972b112b19c77cf01a8808589f4e3eaa5b8164bb059fedf66a1fbb8a9e9cf173049ad42322ae20e9b209055a45d4f11d614d5e1c8e445c
-
SSDEEP
6144:iIzSxdhTIjYq+U5IqTQqdFTyuovksEUPtavIYJu4Jel/KGAwJcR:iBdajVzIqrF2LcKIQYvJe1KKJc
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2548-1-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2156-6-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\fy59tfyCrL5i fy59tfyCrL5i.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2156 fy59tfyCrL5i.exe 2156 fy59tfyCrL5i.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2548 2c4ba683289f711486a2ce38ddcdb523.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2156 fy59tfyCrL5i.exe 2156 fy59tfyCrL5i.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2156 fy59tfyCrL5i.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2548 2c4ba683289f711486a2ce38ddcdb523.exe 2156 fy59tfyCrL5i.exe 2156 fy59tfyCrL5i.exe 2156 fy59tfyCrL5i.exe 2156 fy59tfyCrL5i.exe 2156 fy59tfyCrL5i.exe 2156 fy59tfyCrL5i.exe 2156 fy59tfyCrL5i.exe 2156 fy59tfyCrL5i.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2156 2548 2c4ba683289f711486a2ce38ddcdb523.exe 28 PID 2548 wrote to memory of 2156 2548 2c4ba683289f711486a2ce38ddcdb523.exe 28 PID 2548 wrote to memory of 2156 2548 2c4ba683289f711486a2ce38ddcdb523.exe 28 PID 2548 wrote to memory of 2156 2548 2c4ba683289f711486a2ce38ddcdb523.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c4ba683289f711486a2ce38ddcdb523.exe"C:\Users\Admin\AppData\Local\Temp\2c4ba683289f711486a2ce38ddcdb523.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\PROGRA~3\fy59tfyCrL5i.exeC:\PROGRA~3\fy59tfyCrL5i.exe2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2156
-