Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 02:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4a4595e8ae2bf6e3050cf706739896b0.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
4a4595e8ae2bf6e3050cf706739896b0.exe
-
Size
56KB
-
MD5
4a4595e8ae2bf6e3050cf706739896b0
-
SHA1
df2bed0770ea8c85b9ddcf18539c14508b26117a
-
SHA256
73e36cec52a79387609b5c4423c12bab2f86204c7c2a655b0c3190351ef18b30
-
SHA512
7f605c9437ff6bc4a1939d2541593c4f2d8b6a64fc7213ddbda2cad47d0ff751bc239c890801a8c309ebf4822b6121db593629871fc9ad1119810cd6f122806d
-
SSDEEP
768://Cc9et/M/57hQ6GceJeTaENag0qTXSKIrvDsH7dq4rY5i:HCcYt/MRlQ6VeJoIrvDIq+R
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 4a4595e8ae2bf6e3050cf706739896b0.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Amoumain.exe 4a4595e8ae2bf6e3050cf706739896b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2012 4a4595e8ae2bf6e3050cf706739896b0.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4a4595e8ae2bf6e3050cf706739896b0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 4a4595e8ae2bf6e3050cf706739896b0.exe