Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 11:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a1d1037f8206fbf48af6df9e84d37f58.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a1d1037f8206fbf48af6df9e84d37f58.exe
Resource
win10v2004-20240221-en
4 signatures
150 seconds
General
-
Target
a1d1037f8206fbf48af6df9e84d37f58.exe
-
Size
12KB
-
MD5
a1d1037f8206fbf48af6df9e84d37f58
-
SHA1
97cb2f0745017a7de1b50fee992e1b8337585783
-
SHA256
971bbb761c2d34efad0c8a4cc25bde6843f85b6e4d2a471f3f4208d82deb494c
-
SHA512
d412ff8afeec6ceb37b86665ac40a045d6913d9f23637aa66eb4e5921e16c043324172a9cb62706cb83ebd29262be4a419bacf40b49f6a4959cb59826f7772f0
-
SSDEEP
384:Zf252vDtHZnrC7VsYz9rxjYC2xSeQNuMgghE:Zu52BHZnrCWYz7X2zQNhE
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155545} a1d1037f8206fbf48af6df9e84d37f58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155545}\StubPath = "C:\\Windows\\SCHVOST.exe" a1d1037f8206fbf48af6df9e84d37f58.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SCHVOST.EXE a1d1037f8206fbf48af6df9e84d37f58.exe File opened for modification C:\Windows\SCHVOST.EXE a1d1037f8206fbf48af6df9e84d37f58.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 a1d1037f8206fbf48af6df9e84d37f58.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1212 2204 a1d1037f8206fbf48af6df9e84d37f58.exe 22
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\a1d1037f8206fbf48af6df9e84d37f58.exe"C:\Users\Admin\AppData\Local\Temp\a1d1037f8206fbf48af6df9e84d37f58.exe"2⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2204
-