Analysis
-
max time kernel
9s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 19:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a6092922a3f408e1b41e84eac255e5a4.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
a6092922a3f408e1b41e84eac255e5a4.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
a6092922a3f408e1b41e84eac255e5a4.exe
-
Size
100KB
-
MD5
a6092922a3f408e1b41e84eac255e5a4
-
SHA1
ad01eacfab15e754eade87e12f07b3c74e1474a2
-
SHA256
58bc2e9245d4cc5b549f363ab5fae6bf43c3ff0f052b3c36291673b7735f53f3
-
SHA512
1379020455d0ca6bc28f1caa62b467c49ace60ad9ce3840a8789294656ee91a2d727c0d18e84091d78bf56171bc381635242b444818a0cbbb69d432d6cdc9aa5
-
SSDEEP
1536:Z5l8iAuismyws2M9Lw0wF9MGM9K/oKtNgCMbA1bL3N+NM5UfaNIjnZkM:l2M9/KLOM5pCniM
Score
10/10
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a6092922a3f408e1b41e84eac255e5a4.exe -
Executes dropped EXE 1 IoCs
pid Process 2264 vxyav.exe -
Loads dropped DLL 2 IoCs
pid Process 2472 a6092922a3f408e1b41e84eac255e5a4.exe 2472 a6092922a3f408e1b41e84eac255e5a4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxyav = "C:\\Users\\Admin\\vxyav.exe /U" a6092922a3f408e1b41e84eac255e5a4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2472 a6092922a3f408e1b41e84eac255e5a4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2472 a6092922a3f408e1b41e84eac255e5a4.exe 2264 vxyav.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2264 2472 a6092922a3f408e1b41e84eac255e5a4.exe 28 PID 2472 wrote to memory of 2264 2472 a6092922a3f408e1b41e84eac255e5a4.exe 28 PID 2472 wrote to memory of 2264 2472 a6092922a3f408e1b41e84eac255e5a4.exe 28 PID 2472 wrote to memory of 2264 2472 a6092922a3f408e1b41e84eac255e5a4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6092922a3f408e1b41e84eac255e5a4.exe"C:\Users\Admin\AppData\Local\Temp\a6092922a3f408e1b41e84eac255e5a4.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\vxyav.exe"C:\Users\Admin\vxyav.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2264
-