Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 16:39

General

  • Target

    Data/textures/textures.exe

  • Size

    100KB

  • MD5

    eafc8bc40ac3d50fa86d1b1cb36d0416

  • SHA1

    8beb4cca6238bbe3d38d2ea4256ffe03007ef217

  • SHA256

    1c91b4a302b48a2517576a83a3496ebca1874dbefdfa040cfd40a4bf7f06c124

  • SHA512

    76fb392329d1d93c7c7d5c3f9559a7c4bdc3427a3970222354a10e0ec315abe92561f5307a71fcb1b7b16222b87f28b42aa97045b26397b3825ea70153bb0568

  • SSDEEP

    768:JKp1NUtlkxTBPW5yX9x3K0gZ/sBoTe+bs5iNVqiNzJOvUkPvRw4cLO1l4kSAtLJc:JZmDK0gwaWJlcLO1l4lAJJtHC

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Data\textures\textures.exe
    "C:\Users\Admin\AppData\Local\Temp\Data\textures\textures.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3012-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3012-5-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB