Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
8c38a8d2886d252aa76bd171000aaff7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c38a8d2886d252aa76bd171000aaff7.exe
Resource
win10v2004-20231215-en
General
-
Target
8c38a8d2886d252aa76bd171000aaff7.exe
-
Size
1.5MB
-
MD5
8c38a8d2886d252aa76bd171000aaff7
-
SHA1
3790ce745032ccbf04b2905e4f1b9cb8cdb39569
-
SHA256
22a61056cf0ce8fe467393abe1d04169311650746f01ccb684d0b09ac4de8390
-
SHA512
238b0fb66ad57d154856367cb6fa69ff7ef57c0b1179fa246ea6193ed6ecb267cdadddb1d725c0e621c49594bb1aa7fb2ed32d019a9c95709bac3887865a0fc8
-
SSDEEP
24576:GHHOlEslQOJzZ7yYsf2zyuKkHWKV0EgFqlN1FrwVvmFSsWt37wZvPYY8Uo/BbqjX:8uysyORFof2e8WKV0XFawYg37I4Y5kkL
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1620 8c38a8d2886d252aa76bd171000aaff7.exe 1620 8c38a8d2886d252aa76bd171000aaff7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 8c38a8d2886d252aa76bd171000aaff7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1620 8c38a8d2886d252aa76bd171000aaff7.exe 1620 8c38a8d2886d252aa76bd171000aaff7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2700 1620 8c38a8d2886d252aa76bd171000aaff7.exe 28 PID 1620 wrote to memory of 2700 1620 8c38a8d2886d252aa76bd171000aaff7.exe 28 PID 1620 wrote to memory of 2700 1620 8c38a8d2886d252aa76bd171000aaff7.exe 28 PID 1620 wrote to memory of 2700 1620 8c38a8d2886d252aa76bd171000aaff7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c38a8d2886d252aa76bd171000aaff7.exe"C:\Users\Admin\AppData\Local\Temp\8c38a8d2886d252aa76bd171000aaff7.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"2⤵PID:2700
-