Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 18:50
Behavioral task
behavioral1
Sample
781de665f493b0fb5cb294e5ba2b23df.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
781de665f493b0fb5cb294e5ba2b23df.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
781de665f493b0fb5cb294e5ba2b23df.exe
-
Size
3.8MB
-
MD5
781de665f493b0fb5cb294e5ba2b23df
-
SHA1
15644428974e74dd13882e94a1db45b5cac1e2b3
-
SHA256
ee2bcc2b314515bfb09b2d3ad22657a86e27f7e60c74ca8b62b02e1903e467ad
-
SHA512
f8d544e4a69e9dec6f92606e811e299437ce33aa36732f0b28fcc681df717ea9d1be2192eeb65fbf73badf922d4604e388b45624de5990792c1c67e820fcfa52
-
SSDEEP
98304:eFYB4etBf0HDoag0y8hPOm+j5uesnwN0UwgFo0fTrfiQl:eFkYWqO/3sw1wgFhiQ
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Internet_Explorer.exe = "C:\\Windows\\System32\\Internet_Explorer.exe" 781de665f493b0fb5cb294e5ba2b23df.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Internet_Explorer.exe 781de665f493b0fb5cb294e5ba2b23df.exe File opened for modification C:\Windows\SysWOW64\Internet_Explorer.exe 781de665f493b0fb5cb294e5ba2b23df.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\windows\01851.tmp 781de665f493b0fb5cb294e5ba2b23df.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1448 schtasks.exe 5372 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5952 781de665f493b0fb5cb294e5ba2b23df.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5952 wrote to memory of 1448 5952 781de665f493b0fb5cb294e5ba2b23df.exe 85 PID 5952 wrote to memory of 1448 5952 781de665f493b0fb5cb294e5ba2b23df.exe 85 PID 5952 wrote to memory of 1448 5952 781de665f493b0fb5cb294e5ba2b23df.exe 85 PID 5952 wrote to memory of 5372 5952 781de665f493b0fb5cb294e5ba2b23df.exe 96 PID 5952 wrote to memory of 5372 5952 781de665f493b0fb5cb294e5ba2b23df.exe 96 PID 5952 wrote to memory of 5372 5952 781de665f493b0fb5cb294e5ba2b23df.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\781de665f493b0fb5cb294e5ba2b23df.exe"C:\Users\Admin\AppData\Local\Temp\781de665f493b0fb5cb294e5ba2b23df.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:5952 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\WINDOWS/autoexec.bat /sc onstart /ru system2⤵
- Creates scheduled task(s)
PID:1448
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\WINDOWS/autoexec.bat /sc onstart /ru system2⤵
- Creates scheduled task(s)
PID:5372
-