Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 21:13
Behavioral task
behavioral1
Sample
7e04d9811ffb8050006199b7149e0284.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
7e04d9811ffb8050006199b7149e0284.exe
-
Size
234KB
-
MD5
7e04d9811ffb8050006199b7149e0284
-
SHA1
c7b5fe0759069bdfa30aaeead19dc5bebc5cdf01
-
SHA256
c6140f8e8ba64466e57bab73bed3b5c69ee22d5e6d828072626376dc03fe6672
-
SHA512
da60249464db7f2b5f5698406eb046ef3ea7d7aaba5a58354e92376549147dac2f26c5d8b9017b784684beae84686ff8fe18955731550619b0944a9d09028a74
-
SSDEEP
6144:N6/HfGdFjZvU1MSGTRa4T3nw9hr4A9KW4uaSoSWO5:KH8FjZsCZYg3crzkX6oSWO5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4972-0-0x0000000000400000-0x00000000005E1000-memory.dmp upx behavioral2/memory/4972-15-0x0000000000400000-0x00000000005E1000-memory.dmp upx behavioral2/memory/4972-17-0x0000000000400000-0x00000000005E1000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7e04d9811ffb8050006199b7149e0284.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4972 7e04d9811ffb8050006199b7149e0284.exe 4972 7e04d9811ffb8050006199b7149e0284.exe 4972 7e04d9811ffb8050006199b7149e0284.exe