Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
5497b5d9cb0bbd8a467e95cfa080b28c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5497b5d9cb0bbd8a467e95cfa080b28c.exe
Resource
win10v2004-20231215-en
General
-
Target
5497b5d9cb0bbd8a467e95cfa080b28c.exe
-
Size
32KB
-
MD5
5497b5d9cb0bbd8a467e95cfa080b28c
-
SHA1
f7d4f9f4801c3a4703e9d885ee56208e73623106
-
SHA256
4e603e146bf49d59e33d383be5871cbbe0ce0d97cf5a64a2ea28bc9075e0fb1a
-
SHA512
5d641ca94a3a415860e7c73de1864e87126458184afd7d9e643730eaa8200cfb7439506508b693564798ea3aaffc72c79660c65801efa813ae06de5288767ac0
-
SSDEEP
384:yRUGUyHm6QsfuLZ5qsE9jk6PWFzvT/taD40skw0PFCLH:yRZUYljk6PwFgAkwGFsH
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\logon = "C:\\WINDOWS\\system32\\logon.exe" 5497b5d9cb0bbd8a467e95cfa080b28c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\beto1 5497b5d9cb0bbd8a467e95cfa080b28c.exe File opened for modification C:\WINDOWS\SysWOW64\beto1 5497b5d9cb0bbd8a467e95cfa080b28c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4684 5497b5d9cb0bbd8a467e95cfa080b28c.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58bfcf44eb468bd8d016c0a378f5ce3b6
SHA111afc64a4248bf6856fc4f8481d6b62f50f86143
SHA25604aa3b55acb1d205869dda64310cd684169666980c1fc4f41d7364ee58a7f973
SHA5123e445d11ba096b13fca27dd4a7cd620eff4a31f90163f91002128baf96ad95bf58f4dd7143ca59789701aacc55fd9d68400e6bff350e1781696cdf0a95754ea8