Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
b8a3097df22fe768639738fbf1afca98.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8a3097df22fe768639738fbf1afca98.exe
Resource
win10v2004-20240226-en
General
-
Target
b8a3097df22fe768639738fbf1afca98.exe
-
Size
120KB
-
MD5
b8a3097df22fe768639738fbf1afca98
-
SHA1
39f479330e46bdafcd6d318003b862a3a688f494
-
SHA256
68c697c83a8c52f454bad8b368366e203287d77dc50e6fa3b553ed4648157b52
-
SHA512
a3fb97a01fcee47fbe4b73dbe3ba72a0481bb39a454f8614268c5194ab27d9918a6eecf70ca47891f53c6eab7e32df3644e69c55cdb4d82a0eef21f4f7f14f2e
-
SSDEEP
1536:2IXQOFIhuCkXlfakHlVtmsuJlFm4Yp0idGiqbmlyxBIVwHGX1zprRnP1ZJqbzNm5:RAOaYCC9HDtmZbclyTIVF1zXnNmzgF
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts b8a3097df22fe768639738fbf1afca98.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2088 ipconfig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 640 b8a3097df22fe768639738fbf1afca98.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 640 wrote to memory of 2088 640 b8a3097df22fe768639738fbf1afca98.exe 28 PID 640 wrote to memory of 2088 640 b8a3097df22fe768639738fbf1afca98.exe 28 PID 640 wrote to memory of 2088 640 b8a3097df22fe768639738fbf1afca98.exe 28 PID 640 wrote to memory of 2088 640 b8a3097df22fe768639738fbf1afca98.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8a3097df22fe768639738fbf1afca98.exe"C:\Users\Admin\AppData\Local\Temp\b8a3097df22fe768639738fbf1afca98.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:2088
-