Analysis
-
max time kernel
1478s -
max time network
1503s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-02-2024 09:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
loader_prod.exe
Resource
win11-20240214-en
windows11-21h2-x64
4 signatures
1800 seconds
General
-
Target
loader_prod.exe
-
Size
25.8MB
-
MD5
bf8c871604eb4297a39c675b655a9f05
-
SHA1
f47bb195479b8f0555e21447503feb2be542ee3a
-
SHA256
3402266e9dea3f417c15c10154ca37761740b41c1c43823b705a177cee32721e
-
SHA512
d316caa28a270e97674069acb93a80e3d616aa5b3f284ca474234188b60238fa1dd39bc542fe6aa0f5f25d70eecca8c9ed4f3414b0bf8af217dbd7e344d0587e
-
SSDEEP
393216:njI1es00EYUK2uKa5b/kiJQQTCKJLigXB+605007GedW6+ADmFRL3am8cRr9IrCK:njIR0062OQTjJ+JOTeiASFycRx
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys loader_prod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys\BDB80C4C6E014512B7B415DCC58E191C85C94C1B loader_prod.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys\BDB80C4C6E014512B7B415DCC58E191C85C94C1B\Blob = 02000000000000006c0000001c000000000000000100000020000000000000000000000002000000610037003600310033003800640061002d0037003200330064002d0034006300300035002d0038003600340038002d003100300063006600390062003700610063003800370066000000000000000000230000000000000014000000bdb80c4c6e014512b7b415dcc58e191c85c94c1b loader_prod.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe 5092 loader_prod.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5092 loader_prod.exe