Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 11:40
Behavioral task
behavioral1
Sample
c0812c3e0e084ed94b0b93d9e6d423be.exe
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
c0812c3e0e084ed94b0b93d9e6d423be.exe
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
c0812c3e0e084ed94b0b93d9e6d423be.exe
-
Size
3.5MB
-
MD5
c0812c3e0e084ed94b0b93d9e6d423be
-
SHA1
4789a8fa78a194a70b29e1b6d4f42dae4eac14c7
-
SHA256
355fd69e61357670cd0ec8f19d2a17648d5e0855e45c5039fbb70396676fd2fd
-
SHA512
b7f96d7cbabd8d361d1ff285f26e91be9ed973d6a6af6184f1b270ae4271c4a132045ce76c4890f9cf647c08f933eecb4e51f6228724dc9dbe302193b9eab413
-
SSDEEP
98304:E0oCPluN81C82ZO6KN+rglU0MsfmZDar5cS1pfQB7IuFwhH:E0pAO882ZVgzeZDciJ7AH
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1540-0-0x0000000000400000-0x0000000000CA0000-memory.dmp upx behavioral1/memory/1540-4-0x0000000000400000-0x0000000000CA0000-memory.dmp upx behavioral1/memory/1540-5-0x0000000000400000-0x0000000000CA0000-memory.dmp upx behavioral1/memory/1540-6-0x0000000000400000-0x0000000000CA0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\avg = "C:\\Arquivos de programas\\avg.exe" c0812c3e0e084ed94b0b93d9e6d423be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\System32\\svchosts.exe" c0812c3e0e084ed94b0b93d9e6d423be.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchosts.exe c0812c3e0e084ed94b0b93d9e6d423be.exe File created C:\Windows\SysWOW64\svchosts.exe c0812c3e0e084ed94b0b93d9e6d423be.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\windows\vx.dll c0812c3e0e084ed94b0b93d9e6d423be.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1540 c0812c3e0e084ed94b0b93d9e6d423be.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2740 1540 c0812c3e0e084ed94b0b93d9e6d423be.exe 28 PID 1540 wrote to memory of 2740 1540 c0812c3e0e084ed94b0b93d9e6d423be.exe 28 PID 1540 wrote to memory of 2740 1540 c0812c3e0e084ed94b0b93d9e6d423be.exe 28 PID 1540 wrote to memory of 2740 1540 c0812c3e0e084ed94b0b93d9e6d423be.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0812c3e0e084ed94b0b93d9e6d423be.exe"C:\Users\Admin\AppData\Local\Temp\c0812c3e0e084ed94b0b93d9e6d423be.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\cmd.execmd /k C:\tuto.exe2⤵PID:2740
-