Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
985745f1d105234f422554ea8554f2ed.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
985745f1d105234f422554ea8554f2ed.exe
Resource
win10v2004-20231215-en
General
-
Target
985745f1d105234f422554ea8554f2ed.exe
-
Size
1.3MB
-
MD5
985745f1d105234f422554ea8554f2ed
-
SHA1
e0dc43f62890f0c17390fdaa260f60055ba4452a
-
SHA256
ab20196e7d8a2bc80f7182c73ce3980dab5c2f5676d7d4c0b6aa448d92afc722
-
SHA512
3a99131e7ea70e243ba0cda7cead4d6726f7481d71da4bb4335ffbb902f9d1bfad1896d5475e47c767dbb8373311e5ca90d954ff568244b68102148beb318d19
-
SSDEEP
24576:EfHhvKfiF1N8OPXx33OpfPFmcyou2c6udcKOnEp222222222222222222222222o:hiHNZZ3+pfPFmc/c6zHnEp222222222D
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 985745f1d105234f422554ea8554f2ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 985745f1d105234f422554ea8554f2ed.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main 985745f1d105234f422554ea8554f2ed.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2536 985745f1d105234f422554ea8554f2ed.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2536 985745f1d105234f422554ea8554f2ed.exe 2536 985745f1d105234f422554ea8554f2ed.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5f7c3f6b0d8ae4b8181daa933cba27598
SHA1ad734fb4b5d9cc7e550e6d497f84d88e48c76020
SHA256e4b4d5c0b653f2ee61bca5532a4954ea80246a89bd315ab54ce863a33ec22cb0
SHA5124dc5d1c5c82ce14ade0a51fca40a679a5ecfdc26770de144821538463dbfe8d58ead8f13cf9323295d5e1d12298fdd4ca922223ef081431760fc4eb6bc2e81c0
-
Filesize
113KB
MD5ad28b33f77e81415ffce95ddcac69dc3
SHA19a725e0c758cad5bccc8cc8073b92e6b04c7a5e6
SHA2569f07edd7fa2ba1f661217f48d10357612965394154572b103affeb3ea683ecea
SHA512ac42ab5dae9a9d15e7525f7b04f28ee952ec5061c9dff5f6d9540e864ce188e5fac6b6f83eb9e9a3bf000af5c3be56aa3ec8e77a58502fb02722fd552b141f55
-
Filesize
89KB
MD5219073097031d9c1a95a1291d66f3a10
SHA12b7996b01d90b7f424f2a2e6063947461db4b2b2
SHA256232066e3f6f1351afdaee1acb70c409766641fd5669e0b55ce7c77fac0a857ef
SHA5129ad2745f96cf79a4d59393cc3fbb3958b244013f6798c12abe41e37fca80df3c7cedab4b47cbd197645c86b31077388ec8f01ea8d67c5feacbef95b1ae7582b5