Analysis
-
max time kernel
1790s -
max time network
1562s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 13:44
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
2.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
2004_akt.scr
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
3.exe
Resource
win7-20240221-en
General
-
Target
3.exe
-
Size
205KB
-
MD5
8bc7c863fc741aa28aa2361d7a319267
-
SHA1
7550cc3b4fef6ea55df793d111f528d121689910
-
SHA256
7dd789d126841ca1a04a17c95b0b23ff553d199a0ba24ac8dd8018bb0fde368b
-
SHA512
88e2e759f4d2647279082f6b3b8cb5b9b29a7df3bc39cc91aefce59a995323b29901a80e3e94aa25a3ddfb5cf9b8f44947bb21067fbe127514b36e3ee9d51f52
-
SSDEEP
6144:5RsJANwLlalnicjyaNGAnn2JZW5QoS1Z1Py97N7al:nYaVz7N5nn2JZwQV31kol
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe\Debugger = "C:\\Windows\\temp\\as.exe" 3.exe -
resource yara_rule behavioral5/memory/2300-0-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\s5ch0st = "C:\\Windows\\temp\\as.exe" 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\s5ch0st = "C:\\Windows\\temp\\as.exe" 3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2300 3.exe