Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 04:33
Behavioral task
behavioral1
Sample
de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe
Resource
win7-20240508-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe
Resource
win10v2004-20240611-en
4 signatures
150 seconds
General
-
Target
de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe
-
Size
7.4MB
-
MD5
dd98a125d1bf326225aa9a845a570ce3
-
SHA1
b4c881fa0515f8a122d393b760a12ea2e192cc99
-
SHA256
de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8
-
SHA512
025e958e7bb313f5159b1c626ea00da57e04936714fe031a9c1738924752e705c8b21559c2e2de88fac481fb2b8e9d396e4a019784810e2ba9df89c021639afb
-
SSDEEP
196608:Yo6qOcQ8w+RblRQmHwVRGE5Ee2SvZ3ZV0:bz5w+RnQVRlielvV
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4340-0-0x0000000000DC0000-0x00000000023E6000-memory.dmp upx behavioral2/memory/4340-2-0x0000000000DC0000-0x00000000023E6000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4688 4340 WerFault.exe 78 -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\psiphon de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\psiphon\ = "URL:psiphon" de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\psiphon\URL Protocol de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\psiphon\shell\open\command de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\psiphon\shell de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\psiphon\shell\open de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\psiphon\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe\" -- \"%1\"" de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4340 de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe 4340 de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe"C:\Users\Admin\AppData\Local\Temp\de6362f88568f307ecc994fde560aec69dba1694a3bc70ed8da770a013d008b8.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 17362⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4340 -ip 43401⤵PID:4984