Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 22:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c1c8a989b1835396f57dbe6457aa3c89.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
c1c8a989b1835396f57dbe6457aa3c89.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
c1c8a989b1835396f57dbe6457aa3c89.exe
-
Size
6.0MB
-
MD5
c1c8a989b1835396f57dbe6457aa3c89
-
SHA1
d8124e7f7e993786abaf84a3dfd8f6699da1c326
-
SHA256
bfcc2917e52d5146b26850df0356a25af0b30b683aec08c265824c2eae4867df
-
SHA512
d9fbcd46d21430289e6869b2756e94990c291a483627d21852bfd54a6ec549f10202060a39dcd3a4f761034aaaddba6fb6c127a501f663a53f7e9068f196b3cf
-
SSDEEP
98304:/zeoDRJ/WoD1rHRk4srTRPnpRXQKaoVASgT4eB:be0Jv6TBvpRXxt+SeB
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1964 set thread context of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main c1c8a989b1835396f57dbe6457aa3c89.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 972 c1c8a989b1835396f57dbe6457aa3c89.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 972 c1c8a989b1835396f57dbe6457aa3c89.exe 972 c1c8a989b1835396f57dbe6457aa3c89.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28 PID 1964 wrote to memory of 972 1964 c1c8a989b1835396f57dbe6457aa3c89.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1c8a989b1835396f57dbe6457aa3c89.exe"C:\Users\Admin\AppData\Local\Temp\c1c8a989b1835396f57dbe6457aa3c89.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\c1c8a989b1835396f57dbe6457aa3c89.exe"C:\Users\Admin\AppData\Local\Temp\c1c8a989b1835396f57dbe6457aa3c89.exe" ""2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:972
-