Analysis
-
max time kernel
140s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 22:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8ab0d22b05a11b01a8391fe787a7dfc5.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
8ab0d22b05a11b01a8391fe787a7dfc5.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
8ab0d22b05a11b01a8391fe787a7dfc5.exe
-
Size
16KB
-
MD5
8ab0d22b05a11b01a8391fe787a7dfc5
-
SHA1
fdba53180c026ca45a8eee4f466d1db35b1d1d4c
-
SHA256
2124425e164f37f2829a58c22763a8dfcf949e6db2ab0ddc8c95a073fea1010f
-
SHA512
35eda48424e2e2dc37173207ff8ead20ad92c3558110cfa83c74f0cc2c7b1cd363aefc245b4dec6ce97eb68063d14d1864b771c377904c499eaa38870b2651e9
-
SSDEEP
384:C3n08OWkPTDPiIYe/xqMgGBTpH/Q0CdDu1K1qwzDw59MzV8e4eltQyy/Zx:cn08JgTDZYgxqWTpfQ0wi8f6uzV5Ix
Score
10/10
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 8ab0d22b05a11b01a8391fe787a7dfc5.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 8ab0d22b05a11b01a8391fe787a7dfc5.exe -
Disables use of System Restore points 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LvbdhfngZK+J+ACYK = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8ab0d22b05a11b01a8391fe787a7dfc5.exe" 8ab0d22b05a11b01a8391fe787a7dfc5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LvbdhfngZK+J+ACYK = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8ab0d22b05a11b01a8391fe787a7dfc5.exe" 8ab0d22b05a11b01a8391fe787a7dfc5.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" 8ab0d22b05a11b01a8391fe787a7dfc5.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4012 8ab0d22b05a11b01a8391fe787a7dfc5.exe 4012 8ab0d22b05a11b01a8391fe787a7dfc5.exe 4012 8ab0d22b05a11b01a8391fe787a7dfc5.exe 4012 8ab0d22b05a11b01a8391fe787a7dfc5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ab0d22b05a11b01a8391fe787a7dfc5.exe"C:\Users\Admin\AppData\Local\Temp\8ab0d22b05a11b01a8391fe787a7dfc5.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4012