Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 20:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a2aa44e3c69d02db2795dbe662e885e9.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a2aa44e3c69d02db2795dbe662e885e9.exe
Resource
win10v2004-20240221-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a2aa44e3c69d02db2795dbe662e885e9.exe
-
Size
3.5MB
-
MD5
a2aa44e3c69d02db2795dbe662e885e9
-
SHA1
f09493a1416d1f2870ae0b8d7bcb7a77ad0c075a
-
SHA256
03f7302160c84701b2beb7319a433c1917bcf3d00a2ccd3877fd70c15bfb36e9
-
SHA512
9c043fc06a28b3ab1c5693e94554272dc205d5bdc9fa23c7f6f0cc670b7942462f4824b5b62d62de61f93b6a97673bdc36d0b629e5a55bc789d55c05a679908f
-
SSDEEP
98304:B73wRd3LDOMS7SGkb7JlMaTIV1smifm8mNarUb81iuf5aapOEW:hi32HRmNlMakVmmom6UY0uxaaIEW
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\csrss = "C:\\Arquivos de programas\\csrss.exe" a2aa44e3c69d02db2795dbe662e885e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchosts.exe = "C:\\Windows\\System32\\svchosts.exe" a2aa44e3c69d02db2795dbe662e885e9.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchosts.exe a2aa44e3c69d02db2795dbe662e885e9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe 1340 a2aa44e3c69d02db2795dbe662e885e9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1340 a2aa44e3c69d02db2795dbe662e885e9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2aa44e3c69d02db2795dbe662e885e9.exe"C:\Users\Admin\AppData\Local\Temp\a2aa44e3c69d02db2795dbe662e885e9.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1340