Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:45
Behavioral task
behavioral1
Sample
75209d766d6529478f5942c5c4f80210.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
75209d766d6529478f5942c5c4f80210.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
75209d766d6529478f5942c5c4f80210.exe
-
Size
175KB
-
MD5
75209d766d6529478f5942c5c4f80210
-
SHA1
3acd7088c7fafa9217df59d4b7bf2660bf9bb060
-
SHA256
f39964d15562ecd5a150872549678e9f2863cc1ae2d5278d8ab6e2a4917bd01f
-
SHA512
8ad4321c91f300d6f5b590cc86bea5f92319c16a1ef882b564113ce43a15c0238bc1782d5774a037e3b2bbc6a9cdb2bb86702c0b5392221d01c5b7018b0cc328
-
SSDEEP
3072:xlQUPpToVCXVOS0lFAOIt/uxLtIa6jB856XAhynBR6aH2euY9I:40EVKOSkfgmxLWa6jnXAhiWeuYG
Score
10/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3464-0-0x0000000000220000-0x0000000000296000-memory.dmp upx behavioral2/memory/3464-1-0x0000000000220000-0x0000000000296000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
75209d766d6529478f5942c5c4f80210.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MeshAgent = "C:\\Program Files (x86)\\Common Files\\meshagent\\meshagent.exe" 75209d766d6529478f5942c5c4f80210.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
75209d766d6529478f5942c5c4f80210.exepid process 3464 75209d766d6529478f5942c5c4f80210.exe 3464 75209d766d6529478f5942c5c4f80210.exe