Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 05:33
Behavioral task
behavioral1
Sample
8e56ed0c2d85c3a581ebd1025278c29a.exe
Resource
win7-20231215-en
7 signatures
150 seconds
General
-
Target
8e56ed0c2d85c3a581ebd1025278c29a.exe
-
Size
191KB
-
MD5
8e56ed0c2d85c3a581ebd1025278c29a
-
SHA1
e3452ce40cbd2c0a6210865d490c4dd80ba62d87
-
SHA256
8dfd2423295002049f9084eb66e2213931d7caa05d9d8e4bc8260154e769c099
-
SHA512
904b31ac72c7094314649c7df8dfdd0952696ffe7d725e53f941d449290fae7e7f34fbefc42983c953838f23edb18bcc670c8cf0010cf82c77ad9ee4c58b666e
-
SSDEEP
3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vm:PWfUkBPyrtBxgQTMK0TKpxS3H8j0br
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3692-0-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral2/memory/3692-15-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral2/memory/3692-17-0x0000000000400000-0x000000000056B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8e56ed0c2d85c3a581ebd1025278c29a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3692 8e56ed0c2d85c3a581ebd1025278c29a.exe 3692 8e56ed0c2d85c3a581ebd1025278c29a.exe 3692 8e56ed0c2d85c3a581ebd1025278c29a.exe