Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 09:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
79d44a318b1e4343349ace466c13ea99.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
79d44a318b1e4343349ace466c13ea99.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
79d44a318b1e4343349ace466c13ea99.exe
-
Size
3.3MB
-
MD5
79d44a318b1e4343349ace466c13ea99
-
SHA1
a2861162cec857794011d0e0df02796ef7b0d23d
-
SHA256
2b35c8fb948bd39cda909fe4542f3c4aa6391db02c524090d9d2b052c5f2ea81
-
SHA512
cc1d320a6843ab8bab58a11e4618157d21cac30e933f5277d218ceb06e5c61f16ee49f0998b8f6efa22dc0ab52411a7aa2d5fccc792cd8dcb51d7e800f7692ad
-
SSDEEP
384:H7iMxz0CYEmqd+1F8TQ2llSSK5dNa17bKNmHfhib0NmXBaaSmqiJh3Nek+vDp:H0CYjqdS2TQOO3+bkmHobJ8a3qiJi
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\WINDOWS\\services.exe" reg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\services.exe 79d44a318b1e4343349ace466c13ea99.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 3016 reg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 3016 2528 79d44a318b1e4343349ace466c13ea99.exe 28 PID 2528 wrote to memory of 3016 2528 79d44a318b1e4343349ace466c13ea99.exe 28 PID 2528 wrote to memory of 3016 2528 79d44a318b1e4343349ace466c13ea99.exe 28 PID 2528 wrote to memory of 3016 2528 79d44a318b1e4343349ace466c13ea99.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\79d44a318b1e4343349ace466c13ea99.exe"C:\Users\Admin\AppData\Local\Temp\79d44a318b1e4343349ace466c13ea99.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add hklm\software\microsoft\windows\currentversion\run /v Windows /d C:\WINDOWS\services.exe /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:3016
-