Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
3d4da97b500e97202da6964a446e4d28.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d4da97b500e97202da6964a446e4d28.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
3d4da97b500e97202da6964a446e4d28.exe
-
Size
1.5MB
-
MD5
3d4da97b500e97202da6964a446e4d28
-
SHA1
5b7ac2e0df9a0d078e6462587ca5157ef4beb0bb
-
SHA256
23a04eca595ffc5dd6d88329bfbb5f48845ca18a274d36041d580b1e05b07ea1
-
SHA512
cc20cd66b312c5810579c12056ac13e129cd73e2a117189b41809bd7e830649ad9df742c739b2c4448afc77f08318fe0684dfaca4dd195c6c1e4acaccd0b98fa
-
SSDEEP
24576:qpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eG:HcZC35VcOcmDcc6Cd
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main 3d4da97b500e97202da6964a446e4d28.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1992 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2276 3d4da97b500e97202da6964a446e4d28.exe 2276 3d4da97b500e97202da6964a446e4d28.exe 2276 3d4da97b500e97202da6964a446e4d28.exe 2276 3d4da97b500e97202da6964a446e4d28.exe 2276 3d4da97b500e97202da6964a446e4d28.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2392 2252 3d4da97b500e97202da6964a446e4d28.exe 21 PID 2252 wrote to memory of 2392 2252 3d4da97b500e97202da6964a446e4d28.exe 21 PID 2252 wrote to memory of 2392 2252 3d4da97b500e97202da6964a446e4d28.exe 21 PID 2252 wrote to memory of 2392 2252 3d4da97b500e97202da6964a446e4d28.exe 21 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 PID 2392 wrote to memory of 1992 2392 cmd.exe 17 PID 2392 wrote to memory of 1992 2392 cmd.exe 17 PID 2392 wrote to memory of 1992 2392 cmd.exe 17 PID 2392 wrote to memory of 1992 2392 cmd.exe 17 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19 PID 2252 wrote to memory of 2276 2252 3d4da97b500e97202da6964a446e4d28.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d4da97b500e97202da6964a446e4d28.exe"C:\Users\Admin\AppData\Local\Temp\3d4da97b500e97202da6964a446e4d28.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\3d4da97b500e97202da6964a446e4d28.exe"C:\Users\Admin\AppData\Local\Temp\3d4da97b500e97202da6964a446e4d28.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:2392
-
-
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.81⤵
- Runs ping.exe
PID:1992