Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe
Resource
win10v2004-20240226-en
General
-
Target
88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe
-
Size
196KB
-
MD5
16520eeb2cfc9bf7b596ae3b97f89e55
-
SHA1
2954c6eb1ec0b36e38a694c19c2f20a097fe0653
-
SHA256
88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968
-
SHA512
25764751734c2f14c61b0d27279436978dd06c668e6914e0a9dedb1ec36fec18ea5706d98eb15716454c3bc15f7e5a8e0c8b20befd009e2eed2137c3c0d6fb53
-
SSDEEP
3072:q7k0QpFZyOSAYZRx6iDrhLOUpHCvvFM1icGJbeiy8JpQG2AysGtFLx6lmJbei:q7k0lrTivFMAcGUVQiAyxclmU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Updates = "D:\\Updates.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Backup = "D:\\Backup.exe" reg.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1172 reg.exe 3160 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 352 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 352 wrote to memory of 1880 352 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 84 PID 352 wrote to memory of 1880 352 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 84 PID 352 wrote to memory of 1880 352 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 84 PID 352 wrote to memory of 468 352 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 85 PID 352 wrote to memory of 468 352 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 85 PID 352 wrote to memory of 468 352 88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe 85 PID 468 wrote to memory of 1172 468 cmd.exe 89 PID 468 wrote to memory of 1172 468 cmd.exe 89 PID 468 wrote to memory of 1172 468 cmd.exe 89 PID 1880 wrote to memory of 3160 1880 cmd.exe 90 PID 1880 wrote to memory of 3160 1880 cmd.exe 90 PID 1880 wrote to memory of 3160 1880 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe"C:\Users\Admin\AppData\Local\Temp\88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\cmd.execmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\reg.exereg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:3160
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\reg.exereg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD516520eeb2cfc9bf7b596ae3b97f89e55
SHA12954c6eb1ec0b36e38a694c19c2f20a097fe0653
SHA25688527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968
SHA51225764751734c2f14c61b0d27279436978dd06c668e6914e0a9dedb1ec36fec18ea5706d98eb15716454c3bc15f7e5a8e0c8b20befd009e2eed2137c3c0d6fb53