Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 14:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
photo/photo.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
photo/photo.exe
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
photo/photo.exe
-
Size
51KB
-
MD5
db496a6b89032d7de66c33da226bde82
-
SHA1
533b5654aa7f7b0127cae4a845d766c19b2d89eb
-
SHA256
603dd2d103cfb7b7e0a61479a0a5c6d33cb819819a80c32bac980b7c82f465e9
-
SHA512
782ae162f492835bf3101614c84ee5e78bd4eaa12ec0b766e90738973fd9af1061681dc6c47c373129b873ecdfc8071b648176bf4ab4818ca55f745c54348101
-
SSDEEP
1536:0SHB2fnEHcZbeYJnlVpisaMTVjCzc5oPoG67:H2cHgXlD2MTVjCATF
Score
6/10
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum photo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 photo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2872 set thread context of 2968 2872 photo.exe 28 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2968 photo.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2968 2872 photo.exe 28 PID 2872 wrote to memory of 2968 2872 photo.exe 28 PID 2872 wrote to memory of 2968 2872 photo.exe 28 PID 2872 wrote to memory of 2968 2872 photo.exe 28 PID 2872 wrote to memory of 2968 2872 photo.exe 28 PID 2872 wrote to memory of 2968 2872 photo.exe 28 PID 2872 wrote to memory of 2968 2872 photo.exe 28 PID 2968 wrote to memory of 2984 2968 photo.exe 29 PID 2968 wrote to memory of 2984 2968 photo.exe 29 PID 2968 wrote to memory of 2984 2968 photo.exe 29 PID 2968 wrote to memory of 2984 2968 photo.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\photo\photo.exe"C:\Users\Admin\AppData\Local\Temp\photo\photo.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\photo\photo.exe"C:\Users\Admin\AppData\Local\Temp\photo\photo.exe"2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2984
-
-