Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 11:47
Behavioral task
behavioral1
Sample
5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe
Resource
win10v2004-20240426-en
General
-
Target
5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe
-
Size
13.0MB
-
MD5
9edb6e5beebc62b120b9880d865b6ffb
-
SHA1
7501410b6632ed3a8ddbf574990d7b07f9b31a80
-
SHA256
5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b
-
SHA512
895de9f59bd95278c7b2022c568a5f300448b086d66ef63047e2ec3f6b258de31f62b7d14d1a9400c8768a55d3a0401c46105e21d1c3a35480ce5fbea1ed5c93
-
SSDEEP
196608:wnC20D8MFxKhdj9O0AoHWrXoLGI+zNLdmODAH06tWnJ1ebrqNR2R7+j9:wnA8ywhdRvbWr49hFH06ttbrqNk+B
Malware Config
Signatures
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FF8EFF09-2CE0-443F-B774-755550B4AFB5} 5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FF8EFF09-2CE0-443F-B774-755550B4AFB5}\LaunchPermission = 010014804c0000005c000000140000003000000002001c0001000000110014000400000001010000000000100010000002001c0001000000000014000b0000000101000000000001000000000102000000000005200000002002000001020000000000052000000020020000 5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FF8EFF09-2CE0-443F-B774-755550B4AFB5}\AccessPermission = 010014804c0000005c000000140000003000000002001c0001000000110014000400000001010000000000100010000002001c0001000000000014000b0000000101000000000001000000000102000000000005200000002002000001020000000000052000000020020000 5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4444 5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe 4444 5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe 4444 5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe 4444 5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4444 5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe 4444 5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe"C:\Users\Admin\AppData\Local\Temp\5a8d4baaad57e8baa8a425754881b68ded18c3782c9b807f2b185eea404dcb8b.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4444