Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 01:07
Behavioral task
behavioral1
Sample
5bbc144b156c626c9db845a18229779c.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
5bbc144b156c626c9db845a18229779c.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
5bbc144b156c626c9db845a18229779c.exe
-
Size
97KB
-
MD5
5bbc144b156c626c9db845a18229779c
-
SHA1
74605041c117d9bd3f769208f8e98dc87d1d6dae
-
SHA256
418ff9255a26441f05bec106382278e0b04398b64ae82fa40998ac8cb066e9d1
-
SHA512
ed8a80457b78b11d19b4e503f1e82527ce0a814dfab1f225b13f598bc9c6891dc541daca7493a2577be012681033f1b930c41c6d605afc4af16ef659f71c2555
-
SSDEEP
384:qyY2YZrB4wiVSHO4mCIYP8LD6YN7+h4u/:nY2YZ2iOdNAX
Score
10/10
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5bbc144b156c626c9db845a18229779c.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5bbc144b156c626c9db845a18229779c.exe -
Disables use of System Restore points 1 TTPs
-
resource yara_rule behavioral1/memory/1656-0-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/1656-1-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/1656-2-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/1656-10-0x0000000000400000-0x0000000000437000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\LvbdhfngYK/ANA/2L = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5bbc144b156c626c9db845a18229779c.exe" 5bbc144b156c626c9db845a18229779c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LvbdhfngYK/ANA/2L = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5bbc144b156c626c9db845a18229779c.exe" 5bbc144b156c626c9db845a18229779c.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" 5bbc144b156c626c9db845a18229779c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1656 5bbc144b156c626c9db845a18229779c.exe 1656 5bbc144b156c626c9db845a18229779c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bbc144b156c626c9db845a18229779c.exe"C:\Users\Admin\AppData\Local\Temp\5bbc144b156c626c9db845a18229779c.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1656