Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 13:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d3a70fb165b3f47d89461c62e357d2cd.exe
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d3a70fb165b3f47d89461c62e357d2cd.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
d3a70fb165b3f47d89461c62e357d2cd.exe
-
Size
9KB
-
MD5
d3a70fb165b3f47d89461c62e357d2cd
-
SHA1
1b24f90c710fec526a22806ec0b6f6a03c18c32b
-
SHA256
fb775cfa400cd8a5e25a8f1940c73c02c2ef6f92ac48fba7bee562b60797b122
-
SHA512
e817845c82bf67deb71ac4f8f95f227637a6e2e64fa8d0d17a25c75ccd0037340462ef3f14f1c5bf9f1bc4a3d8975b04773e1f4e44dcbf44a19f23a76e72a634
-
SSDEEP
192:q5dJac9onhc5oBSPmIjEnr2slHt0BK7lR:q9HKhc5Y/IRsxt+K7l
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{a020418f-28a8-7dfd-7dfd-39b9da1803d6} d3a70fb165b3f47d89461c62e357d2cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{a020418f-28a8-7dfd-7dfd-39b9da1803d6}\StubPath = "C:\\Windows\\system32\\bxttdczoq\\lsass.exe /t" d3a70fb165b3f47d89461c62e357d2cd.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: d3a70fb165b3f47d89461c62e357d2cd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\bxttdczoq\lsass.exe d3a70fb165b3f47d89461c62e357d2cd.exe File created C:\Windows\SysWOW64\bxttdczoq\lsass.exe d3a70fb165b3f47d89461c62e357d2cd.exe