Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe
Resource
win10v2004-20240226-en
General
-
Target
88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe
-
Size
196KB
-
MD5
16520eeb2cfc9bf7b596ae3b97f89e55
-
SHA1
2954c6eb1ec0b36e38a694c19c2f20a097fe0653
-
SHA256
88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968
-
SHA512
25764751734c2f14c61b0d27279436978dd06c668e6914e0a9dedb1ec36fec18ea5706d98eb15716454c3bc15f7e5a8e0c8b20befd009e2eed2137c3c0d6fb53
-
SSDEEP
3072:q7k0QpFZyOSAYZRx6iDrhLOUpHCvvFM1icGJbeiy8JpQG2AysGtFLx6lmJbei:q7k0lrTivFMAcGUVQiAyxclmU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\Updates = "D:\\Updates.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\Backup = "D:\\Backup.exe" reg.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2728 reg.exe 2572 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3004 2624 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 28 PID 2624 wrote to memory of 3004 2624 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 28 PID 2624 wrote to memory of 3004 2624 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 28 PID 2624 wrote to memory of 3004 2624 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 28 PID 2624 wrote to memory of 2580 2624 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 29 PID 2624 wrote to memory of 2580 2624 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 29 PID 2624 wrote to memory of 2580 2624 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 29 PID 2624 wrote to memory of 2580 2624 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 29 PID 3004 wrote to memory of 2572 3004 cmd.exe 33 PID 3004 wrote to memory of 2572 3004 cmd.exe 33 PID 3004 wrote to memory of 2572 3004 cmd.exe 33 PID 3004 wrote to memory of 2572 3004 cmd.exe 33 PID 2580 wrote to memory of 2728 2580 cmd.exe 32 PID 2580 wrote to memory of 2728 2580 cmd.exe 32 PID 2580 wrote to memory of 2728 2580 cmd.exe 32 PID 2580 wrote to memory of 2728 2580 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe"C:\Users\Admin\AppData\Local\Temp\88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\reg.exereg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\reg.exereg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD516520eeb2cfc9bf7b596ae3b97f89e55
SHA12954c6eb1ec0b36e38a694c19c2f20a097fe0653
SHA25688527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968
SHA51225764751734c2f14c61b0d27279436978dd06c668e6914e0a9dedb1ec36fec18ea5706d98eb15716454c3bc15f7e5a8e0c8b20befd009e2eed2137c3c0d6fb53