Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 05:34
Behavioral task
behavioral1
Sample
8b869cc11ab2d4ebc9b4eb5325f53cac.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
8b869cc11ab2d4ebc9b4eb5325f53cac.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
8b869cc11ab2d4ebc9b4eb5325f53cac.exe
-
Size
866KB
-
MD5
8b869cc11ab2d4ebc9b4eb5325f53cac
-
SHA1
ebeb4b4d29bcb1d9eaa62c828384229f718b5b75
-
SHA256
1ecfd11f2f921f3f7f9cdeda82f69b8d5d2ec2abcd972655b444f0172b43b1de
-
SHA512
2f589245e2adad9277ca9aa587424cb5c89fc7a4924e159c65915d6dbed1a70b3d6a14a71d9399b29d1c09a7450905e1183201b79088d02a695a67be21dc151c
-
SSDEEP
24576:vzo8VTJNtyHxct7cVWca1Y+Yx3U8Y2jAOz2P5zhb89fT:vz5DNca8Ja1Yb3cgAOz2P5zhK
Score
8/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8b869cc11ab2d4ebc9b4eb5325f53cac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\win32 = "C:\\Windows\\system32\\isaas.exe" 8b869cc11ab2d4ebc9b4eb5325f53cac.exe -
resource yara_rule behavioral1/memory/2232-1-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-3-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-4-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-5-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-6-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-7-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-8-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-9-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-10-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-11-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-12-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-13-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-14-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-15-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-16-0x0000000000400000-0x0000000000ECC000-memory.dmp upx behavioral1/memory/2232-17-0x0000000000400000-0x0000000000ECC000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\isaas.exe 8b869cc11ab2d4ebc9b4eb5325f53cac.exe File opened for modification C:\Windows\SysWOW64\isaas.exe 8b869cc11ab2d4ebc9b4eb5325f53cac.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2232 8b869cc11ab2d4ebc9b4eb5325f53cac.exe