Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
d3632e606ccf44608279202edefbc3b6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3632e606ccf44608279202edefbc3b6.exe
Resource
win10v2004-20240226-en
General
-
Target
d3632e606ccf44608279202edefbc3b6.exe
-
Size
448KB
-
MD5
d3632e606ccf44608279202edefbc3b6
-
SHA1
ba7c05382840aab1c3bcb6d1e98ca50b3e8241e2
-
SHA256
e4ddf092de2a2d17b32c888ddb67aab501c1cce571593e55a427f3a1f7a2685f
-
SHA512
e548d6404f3754e1e7a33501f4bd4c0fadbadcfdbba823e7e2e7bcbf790a9d3d18e2d98e3f4f83fd5019f4b199d584d9d7cf8a5b9ef68ebacc04a02631f28e0f
-
SSDEEP
6144:zYbhyqra39+Ojil789AoiHu2X25T1z2LJzWDnWJh/kIT0US6nmcHcaFM2qJRWQcW:GHROqYuyzsOLO1q
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\nu d3632e606ccf44608279202edefbc3b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d3632e606ccf44608279202edefbc3b6.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2008 set thread context of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2008 d3632e606ccf44608279202edefbc3b6.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28 PID 2008 wrote to memory of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28 PID 2008 wrote to memory of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28 PID 2008 wrote to memory of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28 PID 2008 wrote to memory of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28 PID 2008 wrote to memory of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28 PID 2008 wrote to memory of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28 PID 2008 wrote to memory of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28 PID 2008 wrote to memory of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28 PID 2008 wrote to memory of 2312 2008 d3632e606ccf44608279202edefbc3b6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3632e606ccf44608279202edefbc3b6.exe"C:\Users\Admin\AppData\Local\Temp\d3632e606ccf44608279202edefbc3b6.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\d3632e606ccf44608279202edefbc3b6.exeC:\Users\Admin\AppData\Local\Temp\d3632e606ccf44608279202edefbc3b6.exe2⤵PID:2312
-