Analysis
-
max time kernel
149s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 14:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8720a1ab16bc568460b9fa2069b8f615.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
8720a1ab16bc568460b9fa2069b8f615.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
8720a1ab16bc568460b9fa2069b8f615.exe
-
Size
3.5MB
-
MD5
8720a1ab16bc568460b9fa2069b8f615
-
SHA1
575339496e63575ff6b9fc544213c33ffd03ba84
-
SHA256
3c99691da218ce57511f3a5204fd899e55744e97c0c8fd9b18a1163b7b46b430
-
SHA512
75502b461973d1b40589ac1498410cac39928733fa6cfe6ae743d2be7a6b260e26d03a9c4d905c068d24ea055a0d85d9d6e055d0243ede541057f94182ea0239
-
SSDEEP
49152:DA00JhrXn9+33znJkK5ZRPd6eliUeFHhLM2e5KFvHD7qqfmiqy9C:DA0T3zJjRl6tfYKFr7q/iq3
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Arquivos de programas\\WindowsUpdate.scr" 8720a1ab16bc568460b9fa2069b8f615.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchosts.exe = "C:\\Windows\\System32\\svchosts.exe" 8720a1ab16bc568460b9fa2069b8f615.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchosts.exe 8720a1ab16bc568460b9fa2069b8f615.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe 8720a1ab16bc568460b9fa2069b8f615.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\windows\D39 8720a1ab16bc568460b9fa2069b8f615.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1540 8720a1ab16bc568460b9fa2069b8f615.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8720a1ab16bc568460b9fa2069b8f615.exe"C:\Users\Admin\AppData\Local\Temp\8720a1ab16bc568460b9fa2069b8f615.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
PID:1540