Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 12:26
Behavioral task
behavioral1
Sample
775b378565714b97a16bb1f310d8985f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
775b378565714b97a16bb1f310d8985f.exe
Resource
win10v2004-20231222-en
General
-
Target
775b378565714b97a16bb1f310d8985f.exe
-
Size
75KB
-
MD5
775b378565714b97a16bb1f310d8985f
-
SHA1
d613c246b20be4fa736ac0b9b14474e6fa3f464b
-
SHA256
142570777d5b1d3c0b855f7f09f93e16a92d021c19ee9ca92b678079aeb990e3
-
SHA512
867bb38979e7ec680885233b0fa90e61dd1f29a8816b661994d4c0ad49dffbb9c9ec27f4ffe5363b4cf92ce77dcafa7d3d4f4cd2ee81eb4a1753848328261b6e
-
SSDEEP
1536:tKAwr2oYjuyZGj792gswbyT2+3QKfOOiydGbnouy8tMJ:tKQo2uym79fdKfOOiyduouttMJ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2916-0-0x0000000001090000-0x00000000010CD000-memory.dmp upx behavioral1/memory/2916-5-0x0000000001090000-0x00000000010CD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fef2fcf9eefbf1b9f2eff2 = "C:\\Users\\Admin\\AppData\\Roaming\\nylf.exe" 775b378565714b97a16bb1f310d8985f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 775b378565714b97a16bb1f310d8985f.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 775b378565714b97a16bb1f310d8985f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 775b378565714b97a16bb1f310d8985f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2916 775b378565714b97a16bb1f310d8985f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2916 775b378565714b97a16bb1f310d8985f.exe 2916 775b378565714b97a16bb1f310d8985f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\775b378565714b97a16bb1f310d8985f.exe"C:\Users\Admin\AppData\Local\Temp\775b378565714b97a16bb1f310d8985f.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2916