Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 01:01
Behavioral task
behavioral1
Sample
521e8a052c365e0d0019cb1f247db357.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
521e8a052c365e0d0019cb1f247db357.exe
Resource
win10v2004-20231222-en
7 signatures
150 seconds
General
-
Target
521e8a052c365e0d0019cb1f247db357.exe
-
Size
219KB
-
MD5
521e8a052c365e0d0019cb1f247db357
-
SHA1
2bd40515d3a41b95998767e0eb90d1f3cbc4e136
-
SHA256
7dfdd46ba78c1c68cca5fe42513646745e9cca8c831f96a612f560d9b085b17f
-
SHA512
1cd6dd781159e5b636b65a99d08d359fc901549f23707593b6a64135cc677e481f734852ffe0d8d620c6e1e381d3ec4dd4ac144ab68c865bbb5923890d19a5d3
-
SSDEEP
3072:vuPX1Z1KxywbsXnCtwdLiLuYpjyLNpb42KCSKXmPGpH/gwYnlqFXMzeeW6qt+PUj:vuNaAdCtNpR4nKCSKX7J3Ylnz+6T
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3020-0-0x0000000000400000-0x0000000000475000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\CE8SIIFGSU = "C:\\Users\\Admin\\AppData\\Local\\Temp\\521e8a052c365e0d0019cb1f247db357.exe" 521e8a052c365e0d0019cb1f247db357.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job 521e8a052c365e0d0019cb1f247db357.exe File opened for modification C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job 521e8a052c365e0d0019cb1f247db357.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main 521e8a052c365e0d0019cb1f247db357.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3020 521e8a052c365e0d0019cb1f247db357.exe 3020 521e8a052c365e0d0019cb1f247db357.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3020 521e8a052c365e0d0019cb1f247db357.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\521e8a052c365e0d0019cb1f247db357.exe"C:\Users\Admin\AppData\Local\Temp\521e8a052c365e0d0019cb1f247db357.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:3020