Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe
Resource
win10v2004-20240412-en
General
-
Target
9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe
-
Size
250KB
-
MD5
e301b784d1b0de364699ecb9c2c59c1a
-
SHA1
a343994b3dfd8b1875e8a41660556c69fb3a9f20
-
SHA256
9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84
-
SHA512
4d9bc3ede41fe89798558d615bdd06248175f87f387f33385f41d8b1a474cefd712b114928051c4fa178dad8a71111ee7031cbf2df5072773f8901b3489b27b4
-
SSDEEP
6144:HmkLu0Aqur8q7XMaC4+yPY7HLgZl3MovMfCp5C6:GkLsqur8q7Xp27rk3MoF
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\6447D291 = "C:\\Users\\Admin\\AppData\\Roaming\\6447D291\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe 2380 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2380 winver.exe 1372 Explorer.EXE 1372 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1372 Explorer.EXE 1372 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2380 2364 9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe 28 PID 2364 wrote to memory of 2380 2364 9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe 28 PID 2364 wrote to memory of 2380 2364 9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe 28 PID 2364 wrote to memory of 2380 2364 9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe 28 PID 2364 wrote to memory of 2380 2364 9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe 28 PID 2380 wrote to memory of 1372 2380 winver.exe 21 PID 2380 wrote to memory of 1260 2380 winver.exe 19 PID 2380 wrote to memory of 1328 2380 winver.exe 20 PID 2380 wrote to memory of 1372 2380 winver.exe 21 PID 2380 wrote to memory of 1628 2380 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1260
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe"C:\Users\Admin\AppData\Local\Temp\9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2380
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1628