Analysis
-
max time kernel
0s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 00:26
Behavioral task
behavioral1
Sample
44d11cf23e5bfe83fc34cf0ccfcc5d1e.exe
Resource
win7-20231215-en
14 signatures
150 seconds
Behavioral task
behavioral2
Sample
44d11cf23e5bfe83fc34cf0ccfcc5d1e.exe
Resource
win10v2004-20231222-en
7 signatures
150 seconds
General
-
Target
44d11cf23e5bfe83fc34cf0ccfcc5d1e.exe
-
Size
123KB
-
MD5
44d11cf23e5bfe83fc34cf0ccfcc5d1e
-
SHA1
c4a68d0899fbf75a4964df51efd4c291b703b9c1
-
SHA256
7dfb2396a56ca68b20a442000772bd3d55883c0983b287abc3a274faf05245c2
-
SHA512
4e8ae6197cc873b8a27290a3a3f72fbeba7eb51ba552f3f324761dfd97bcf8d945cbb47e4b7ca5f012ec5509b94a05a47bd94ed33fbf4daa8c56cefa1a4a0ba1
-
SSDEEP
3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLL7ReDmlP:OVYrJrOSsRwcpdGo
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2732 iaccess32.exe -
resource yara_rule behavioral2/memory/1184-0-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2732-5-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1184-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2732-55-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tmlpcert2007 iaccess32.exe File created C:\Windows\iaccess32.exe 44d11cf23e5bfe83fc34cf0ccfcc5d1e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs regedit.exe 1 IoCs
pid Process 3884 regedit.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1184 44d11cf23e5bfe83fc34cf0ccfcc5d1e.exe 2732 iaccess32.exe 2732 iaccess32.exe 2732 iaccess32.exe 2732 iaccess32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1184 wrote to memory of 2732 1184 44d11cf23e5bfe83fc34cf0ccfcc5d1e.exe 24 PID 1184 wrote to memory of 2732 1184 44d11cf23e5bfe83fc34cf0ccfcc5d1e.exe 24 PID 1184 wrote to memory of 2732 1184 44d11cf23e5bfe83fc34cf0ccfcc5d1e.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\44d11cf23e5bfe83fc34cf0ccfcc5d1e.exe"C:\Users\Admin\AppData\Local\Temp\44d11cf23e5bfe83fc34cf0ccfcc5d1e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\iaccess32.exeC:\Windows\iaccess32.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s C:\Windows\tmlpcert20071⤵
- Runs regedit.exe
PID:3884
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4624
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\system32\egaccess4_1071.dll"1⤵PID:2612