Analysis
-
max time kernel
39s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 08:36
Behavioral task
behavioral1
Sample
488373c584ab511ad1ddd1025f2a7f5e.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
488373c584ab511ad1ddd1025f2a7f5e.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
488373c584ab511ad1ddd1025f2a7f5e.exe
-
Size
556KB
-
MD5
488373c584ab511ad1ddd1025f2a7f5e
-
SHA1
e92baf47e6e8648325f1f6eb41146810dc05a9dd
-
SHA256
3f871ee2eef91764cc6af09f3529687875053d4ed91424a6c31fe71bbd078e82
-
SHA512
fc8554f33cb74c8e487374b40b2de29604472c98748b92dd6e9391f8fb65d3c112d00b5ddfe300606e31690d49c0227487045a5ac103cecd6526a835db3dd102
-
SSDEEP
12288:7GMVWEswD7o/Aoy51aISoO+YlyeU81GYOCmBmXHKwMMzk:7GSWEhnoIooSUY40G4imXHKwMMzk
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1908-0-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/1908-2-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/1908-1-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/1908-92-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/3932-96-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/3932-95-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/3932-94-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/1908-135-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/1908-164-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/1908-165-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/1908-166-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/1908-167-0x0000000000400000-0x0000000000521000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1908 488373c584ab511ad1ddd1025f2a7f5e.exe 1908 488373c584ab511ad1ddd1025f2a7f5e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1908 wrote to memory of 3932 1908 488373c584ab511ad1ddd1025f2a7f5e.exe 91 PID 1908 wrote to memory of 3932 1908 488373c584ab511ad1ddd1025f2a7f5e.exe 91 PID 1908 wrote to memory of 3932 1908 488373c584ab511ad1ddd1025f2a7f5e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\488373c584ab511ad1ddd1025f2a7f5e.exe"C:\Users\Admin\AppData\Local\Temp\488373c584ab511ad1ddd1025f2a7f5e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\488373c584ab511ad1ddd1025f2a7f5e.exe"C:\Users\Admin\AppData\Local\Temp\488373c584ab511ad1ddd1025f2a7f5e.exe" /_ShowProgress2⤵PID:3932
-