Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 12:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5395d0e4824da2a0c7dd69121b9d1766.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
5395d0e4824da2a0c7dd69121b9d1766.exe
-
Size
987KB
-
MD5
5395d0e4824da2a0c7dd69121b9d1766
-
SHA1
620779d5cc9f6be9216e9418367826b7c4ade3a4
-
SHA256
056cd2dea9df90e01fe78e67dbec4f122c48e742f58ecd5266e9d674a99901a8
-
SHA512
7ede5cd797f498755d971e7f990619e9315844a52a7b831f6b72e06fabba80c924b7ba8aaec69dfeba5e7836f0605ef77e18d279b7b1a9a1c54edcb9a04e1e56
-
SSDEEP
24576:jgkPnXqTXd/juSyG0uHWm91TExakK021D0HHprQZ8P:jVOd9yG0u2c1VkK/F0h
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5395d0e4824da2a0c7dd69121b9d1766.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main 5395d0e4824da2a0c7dd69121b9d1766.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 5395d0e4824da2a0c7dd69121b9d1766.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 5395d0e4824da2a0c7dd69121b9d1766.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 5395d0e4824da2a0c7dd69121b9d1766.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2436 5395d0e4824da2a0c7dd69121b9d1766.exe 2436 5395d0e4824da2a0c7dd69121b9d1766.exe