Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 19:26
Behavioral task
behavioral1
Sample
c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe
Resource
win10v2004-20240508-en
General
-
Target
c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe
-
Size
13.0MB
-
MD5
b4e8bb14196ab2e093df5dd8f21f21bf
-
SHA1
187809b044b276df2fed92f980e5ba5a34616fb5
-
SHA256
c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d
-
SHA512
c0e40e671bdaf6b3af4a20bbfa4796f9930bc3dbc5cd8524b03d5523be557fa07ef85fead673557e45d29e3cbc9d5b3335708aa68e7b582509c1886383248c3f
-
SSDEEP
196608:tnC20D8MFxKhdj9O0AoHWrXoLGI+zNLdmODAH06tWnJ1ebrqNg2R7ZjR:tnA8ywhdRvbWr49hFH06ttbrqNpZF
Malware Config
Signatures
-
Modifies registry class 3 IoCs
Processes:
c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FF8EFF09-2CE0-443F-B774-755550B4AFB5} c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FF8EFF09-2CE0-443F-B774-755550B4AFB5}\LaunchPermission = 010014804c0000005c000000140000003000000002001c0001000000110014000400000001010000000000100010000002001c0001000000000014000b0000000101000000000001000000000102000000000005200000002002000001020000000000052000000020020000 c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FF8EFF09-2CE0-443F-B774-755550B4AFB5}\AccessPermission = 010014804c0000005c000000140000003000000002001c0001000000110014000400000001010000000000100010000002001c0001000000000014000b0000000101000000000001000000000102000000000005200000002002000001020000000000052000000020020000 c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exepid process 3708 c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe 3708 c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe 3708 c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe 3708 c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exepid process 3708 c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe 3708 c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe"C:\Users\Admin\AppData\Local\Temp\c1a92c558ad9095301a87dabfe31cbab7cb950cc3545fffc86075120a026056d.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3708