Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 06:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2c7ee2ec3f0bd3cf105363f90b6f3961.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c7ee2ec3f0bd3cf105363f90b6f3961.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
2c7ee2ec3f0bd3cf105363f90b6f3961.exe
-
Size
1024KB
-
MD5
2c7ee2ec3f0bd3cf105363f90b6f3961
-
SHA1
7b3b95b10d4afe29eadd776f81d4696e8bf0e9ab
-
SHA256
f1c14694b762f7cf74041ff9ab4f831da9550b385c652b94b06bfb5a5ac5375f
-
SHA512
0f48c30f9856bfc335ce144c2dad8c164b1ca76ed061ccbfd80ef4de001849e1881464db1825ebb7813a154e78cdcf6d69cea9aa2b2724727ae1e06e03a0b30a
-
SSDEEP
1536:ZKMxrpM6t6n4+DLGgh3aOe5idSQmwzqnwqjhurmKFct:Ie64+XGEKFRxwGjAqGct
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\2429B661 = "C:\\Users\\Admin\\AppData\\Roaming\\2429B661\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe 840 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 840 winver.exe 1380 Explorer.EXE 1380 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1380 Explorer.EXE 1380 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2848 wrote to memory of 840 2848 2c7ee2ec3f0bd3cf105363f90b6f3961.exe 18 PID 2848 wrote to memory of 840 2848 2c7ee2ec3f0bd3cf105363f90b6f3961.exe 18 PID 2848 wrote to memory of 840 2848 2c7ee2ec3f0bd3cf105363f90b6f3961.exe 18 PID 2848 wrote to memory of 840 2848 2c7ee2ec3f0bd3cf105363f90b6f3961.exe 18 PID 2848 wrote to memory of 840 2848 2c7ee2ec3f0bd3cf105363f90b6f3961.exe 18 PID 840 wrote to memory of 1380 840 winver.exe 6 PID 840 wrote to memory of 1248 840 winver.exe 8 PID 840 wrote to memory of 1332 840 winver.exe 7 PID 840 wrote to memory of 1380 840 winver.exe 6
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\2c7ee2ec3f0bd3cf105363f90b6f3961.exe"C:\Users\Admin\AppData\Local\Temp\2c7ee2ec3f0bd3cf105363f90b6f3961.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:840
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1332
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248