Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
01caa22adc81cb422dd09469189fdf95.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
01caa22adc81cb422dd09469189fdf95.exe
Resource
win10v2004-20240508-en
General
-
Target
01caa22adc81cb422dd09469189fdf95.exe
-
Size
725KB
-
MD5
01caa22adc81cb422dd09469189fdf95
-
SHA1
cfae7809e22490633fbbc89d137314500961bd08
-
SHA256
990532d1349ede627112296c385c76793221d50401cc9f3e12b9b6b608e25118
-
SHA512
30bd0872b03bfcb278f0953555cec47ce518ca09131361fad808bced9848e783f2d61d5dcede0f2d1b51689b76af93d0ee07b9db22c9d89d33ab0f5a1958aca2
-
SSDEEP
12288:VXhSkl92w+wihw9G+m6J7uC+611THuwfEhSeU8zozoo+dwch6WKLG5n7i4EA1Ho1:thSkl3+rhwg+m6J71n19HnEhSeno+dwV
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\wc98pp.dll 01caa22adc81cb422dd09469189fdf95.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main 01caa22adc81cb422dd09469189fdf95.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 01caa22adc81cb422dd09469189fdf95.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 01caa22adc81cb422dd09469189fdf95.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBCA9F81-8F4F-11D2-90FF-0080C83D3571}\InprocServer32\ThreadingModel = "Apartment" 01caa22adc81cb422dd09469189fdf95.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\ic32pp 01caa22adc81cb422dd09469189fdf95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\ic32pp\CLSID = "{BBCA9F81-8F4F-11D2-90FF-0080C83D3571}" 01caa22adc81cb422dd09469189fdf95.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBCA9F81-8F4F-11D2-90FF-0080C83D3571} 01caa22adc81cb422dd09469189fdf95.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBCA9F81-8F4F-11D2-90FF-0080C83D3571}\InprocServer32 01caa22adc81cb422dd09469189fdf95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBCA9F81-8F4F-11D2-90FF-0080C83D3571}\InprocServer32\ = "C:\\Windows\\wc98pp.dll" 01caa22adc81cb422dd09469189fdf95.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2596 01caa22adc81cb422dd09469189fdf95.exe 2596 01caa22adc81cb422dd09469189fdf95.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5733381be8d0d7b987d0704d30e8922ab
SHA1d2df18722c9d7dddf5b1c3bafd555b0494daa941
SHA25655b32e545c7168d244948810d60952215a4beff4faf12da32235476f81993164
SHA51218913b16b789f0579e745ddd57d5994479682b1f5d883f2e5f8cd71057983183e8b1e0f4e15f31e0e8fe7fe68136f2b7808be0b4d1eff5ca0505fe0e137244bd