Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 08:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b853c5d0cb26fd76d6cd23a650062677.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
b853c5d0cb26fd76d6cd23a650062677.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
b853c5d0cb26fd76d6cd23a650062677.exe
-
Size
20KB
-
MD5
b853c5d0cb26fd76d6cd23a650062677
-
SHA1
1db98a833cf2c0838ea2ac4f1f9abb1ef42de11e
-
SHA256
1255cdc7bd28f3112044ef2bbb8204129af890b8f5c957415ad9c007800b2707
-
SHA512
37547e10ef7a0c79dc2c5d180faca8c2c242f1336ba271ac1cb66ec6154886a7ca108d9e7a40ff1709c173d71345cc70518fa61d81cf7cb166fb739b9e65628b
-
SSDEEP
192:P1rAhLjhLG/Ge0gWQEh6GzfBnnB+21U/zg++19/rUmntEnrFyL:P2NLG/GPvQEnJn42q/z5+/oTF
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winldr32 = "C:\\Windows\\winldr32.exe" b853c5d0cb26fd76d6cd23a650062677.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\kjlib.dll b853c5d0cb26fd76d6cd23a650062677.exe File created C:\Windows\kjpost.dll b853c5d0cb26fd76d6cd23a650062677.exe File created C:\Windows\winldr32.exe b853c5d0cb26fd76d6cd23a650062677.exe File opened for modification C:\Windows\winldr32.exe b853c5d0cb26fd76d6cd23a650062677.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2756 b853c5d0cb26fd76d6cd23a650062677.exe