Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 17:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8785b750f36eb367720a1de82b112e0d.exe
Resource
win7-20231129-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
8785b750f36eb367720a1de82b112e0d.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
8785b750f36eb367720a1de82b112e0d.exe
-
Size
10KB
-
MD5
8785b750f36eb367720a1de82b112e0d
-
SHA1
40116bdcfdff6546d6fb84a926b57cee7e7cc167
-
SHA256
56fd9f388ad82750c96570b1cc47df2400995c199bb93d77f6f93b7f867319f6
-
SHA512
fb5ebf848e1aeef44b5173748e3b39a18a5bad89196d1a95da871eca50b2d09b9165d2bd4c8750825bab996d9495b8a9ac38f14a751fb0170bdba44e63c4fdfb
-
SSDEEP
192:kGMpVX5EL6xRDymm4yeHTrBbgig0zpzb0XH1zRCZEHHO64hit1EI35EftFQA8:kGMfYwJTm4XzCV0Fzb0XhS8O6+iTE4aY
Score
1/10
Malware Config
Signatures
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B55BCDFA-4402-F728-2796-AA0F004EA8D7}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8785b750f36eb367720a1de82b112e0d.exe" 8785b750f36eb367720a1de82b112e0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B55BCDFA-4402-F728-2796-AA0F004EA8D7}\Data 8785b750f36eb367720a1de82b112e0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B55BCDFA-4402-F728-2796-AA0F004EA8D7}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8785b750f36eb367720a1de82b112e0d.exe" 8785b750f36eb367720a1de82b112e0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B55BCDFA-4402-F728-2796-AA0F004EA8D7}\LocalServer32 8785b750f36eb367720a1de82b112e0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B55BCDFA-4402-F728-2796-AA0F004EA8D7}\Data 8785b750f36eb367720a1de82b112e0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B55BCDFA-4402-F728-2796-AA0F004EA8D7}\Data\ = 00000000ab8ac05600000000000000000000000000000000 8785b750f36eb367720a1de82b112e0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B55BCDFA-4402-F728-2796-AA0F004EA8D7} 8785b750f36eb367720a1de82b112e0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B55BCDFA-4402-F728-2796-AA0F004EA8D7}\LocalServer32 8785b750f36eb367720a1de82b112e0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B55BCDFA-4402-F728-2796-AA0F004EA8D7}\Data\ = 00000000ab8ac05600000000000000000000000000000000 8785b750f36eb367720a1de82b112e0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B55BCDFA-4402-F728-2796-AA0F004EA8D7} 8785b750f36eb367720a1de82b112e0d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8785b750f36eb367720a1de82b112e0d.exe"C:\Users\Admin\AppData\Local\Temp\8785b750f36eb367720a1de82b112e0d.exe"1⤵
- Modifies registry class
PID:4656
-
C:\Users\Admin\AppData\Local\Temp\8785b750f36eb367720a1de82b112e0d.exe"C:\Users\Admin\AppData\Local\Temp\8785b750f36eb367720a1de82b112e0d.exe" /s1⤵
- Modifies registry class
PID:4688