Analysis
-
max time kernel
1562s -
max time network
1567s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 13:44
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
2.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
2004_akt.scr
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
3.exe
Resource
win7-20240221-en
General
-
Target
2.exe
-
Size
248KB
-
MD5
c5e27fba0e03b770df0d05a390abe87f
-
SHA1
f3e9ada6a4e30d773c6b3238166f4836fb08f1b9
-
SHA256
2399c21439f97a3543fd9d123b83d26c90c4198fb0857379e68c581dec9e7754
-
SHA512
73e7f9fc15260f33099ca5d230575ae83c2a3d52f9ecc0a74e7e882e254d406de2c8c29ea133cf2892f4536e9a147df798f1b3cf5f392f43c96c9513f1bd4245
-
SSDEEP
3072:gW4S8eZB3aBRyewVVwVQnNwCEf+XGOfFjk/2VtB+2r+AyVMrqy/bv8Y7EJ1OpI:gW57aCBNdEf+2Of9I8TyVMr7b0Y4Op
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe 2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe\C:\Windows = "Debugger" 2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\expl.exe 2.exe File opened for modification C:\Windows\expl.exe 2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 2.exe