Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2024 23:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f5c149e11be2d664a0d313cb3e921cc.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f5c149e11be2d664a0d313cb3e921cc.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
3f5c149e11be2d664a0d313cb3e921cc.exe
-
Size
52KB
-
MD5
3f5c149e11be2d664a0d313cb3e921cc
-
SHA1
b9e4e4237437cd7bde2f776bcbbab09405df7e74
-
SHA256
550f95515a5b215781734d4f963c51ee2643cd4288b388f5bb7885ce09c2c608
-
SHA512
407028d60301edfdee4b61d61eef4a3333f193e199c3a5a21b42067d4ee931ed49665cbde26d07dac7e71e2be6a2bf2612f56bb228c6fbbb4eb0ab8e49334ed4
-
SSDEEP
768:s2HjJD1hLO1IixdJNgI+QAs31N07DLGw9Fa5ZRDv+kiKxCo10:s2DjpOuijJx3N31NLw9FcJ+AxR10
Score
8/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lkdgdkrc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wisXPw1GND = "C:\\ProgramData\\jwbyvapo\\lkdgdkrc.exe" lkdgdkrc.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 lkdgdkrc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3172 3f5c149e11be2d664a0d313cb3e921cc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3172 wrote to memory of 2904 3172 3f5c149e11be2d664a0d313cb3e921cc.exe 105 PID 3172 wrote to memory of 2904 3172 3f5c149e11be2d664a0d313cb3e921cc.exe 105 PID 3172 wrote to memory of 2904 3172 3f5c149e11be2d664a0d313cb3e921cc.exe 105 PID 3172 wrote to memory of 1792 3172 3f5c149e11be2d664a0d313cb3e921cc.exe 104 PID 3172 wrote to memory of 1792 3172 3f5c149e11be2d664a0d313cb3e921cc.exe 104 PID 3172 wrote to memory of 1792 3172 3f5c149e11be2d664a0d313cb3e921cc.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f5c149e11be2d664a0d313cb3e921cc.exe"C:\Users\Admin\AppData\Local\Temp\3f5c149e11be2d664a0d313cb3e921cc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\3F5C14~1.EXE.bak >> NUL2⤵PID:1792
-
-
C:\ProgramData\jwbyvapo\lkdgdkrc.exeC:\ProgramData\jwbyvapo\lkdgdkrc.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:2904
-