Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 11:40
Behavioral task
behavioral1
Sample
322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe
Resource
win10v2004-20240508-en
General
-
Target
322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe
-
Size
1.9MB
-
MD5
d467f4e3d950cffad657af67e9844f6b
-
SHA1
023324332ec3437e9eeaa512318c2b62dcf18296
-
SHA256
322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4
-
SHA512
e79209661464aaeb0374e4d9694efd519aaf6a978e30d3e8318c45bc3ac47de57fa81230f56b85a14ddf9967f22a92d8267cc9ffb33f681d20c1f551181d8050
-
SSDEEP
24576:UvxlJ9d6IscEUIUH0JCYcQb4uTtyaXWnjovY+1N9f2+W4upMtMAHn8J+RgBbN89i:ULJ96cZH08mr0AWknUxmQlbN+cf
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1924-0-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1252-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1257-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1262-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1263-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1265-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1266-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1267-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1268-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1269-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1270-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1271-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1272-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1273-0x0000000000400000-0x00000000007A7000-memory.dmp upx behavioral1/memory/1924-1274-0x0000000000400000-0x00000000007A7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main 322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1924 322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe 1924 322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe 1924 322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe 1924 322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5865136977962fea2dd67931c14bf60b5
SHA1bebafc23d7b2e8cd0a8bcfb86422f933d182ae6f
SHA256b97a19f9ae7247b42dc4614be0b72a6bb4ba6bd057bb9eedd901a38d8f4cf44f
SHA51246581473cfcab33020e00ccc20fd9fbd90f31763303ec391f6ded8d7ee0083320b5149651b366e3e0fcfc56e4b3ab355647093e840d9dbc7c3487194e5cef6bf