Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 17:58
Behavioral task
behavioral1
Sample
8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe
Resource
win7-20240705-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe
Resource
win10v2004-20240709-en
4 signatures
150 seconds
General
-
Target
8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe
-
Size
8.6MB
-
MD5
2a5229999e2153f7fba048d044e18907
-
SHA1
39e0ad0222e924d339bc128a05d48e8c8e418e51
-
SHA256
8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8
-
SHA512
e11baf51af2f616de100e630924fb26883d98512c842b15d243d5c541c0bf46984c75368a48450b18a2f93ef5e746ece3aa80be44f4242589d554f4a0c09d151
-
SSDEEP
196608:DqkePAUQ7Q0CJSVwBUq+ziVoHw5GQH04pevvHTpZUgbuTF9Wf1:3U0g4M+ziVoHw5G0044vHnUlF9Wf1
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2196-98-0x000000013FA20000-0x0000000140DE6000-memory.dmp vmprotect behavioral1/memory/2196-99-0x000000013FA20000-0x0000000140DE6000-memory.dmp vmprotect behavioral1/memory/2196-100-0x000000013FA20000-0x0000000140DE6000-memory.dmp vmprotect behavioral1/memory/2196-101-0x000000013FA20000-0x0000000140DE6000-memory.dmp vmprotect behavioral1/memory/2196-102-0x000000013FA20000-0x0000000140DE6000-memory.dmp vmprotect behavioral1/memory/2196-103-0x000000013FA20000-0x0000000140DE6000-memory.dmp vmprotect behavioral1/memory/2196-105-0x000000013FA20000-0x0000000140DE6000-memory.dmp vmprotect -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\discord-1210909836288729099\ = "URL:Run game 1210909836288729099 protocol" 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\discord-1210909836288729099\DefaultIcon 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\discord-1210909836288729099\shell\open\command 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\discord-1210909836288729099\shell 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\discord-1210909836288729099\shell\open 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\discord-1210909836288729099\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe" 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\discord-1210909836288729099 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\discord-1210909836288729099\URL Protocol 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\discord-1210909836288729099\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe" 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2196 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe 2196 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2804 2196 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe 31 PID 2196 wrote to memory of 2804 2196 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe 31 PID 2196 wrote to memory of 2804 2196 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe 31 PID 2804 wrote to memory of 2416 2804 cmd.exe 32 PID 2804 wrote to memory of 2416 2804 cmd.exe 32 PID 2804 wrote to memory of 2416 2804 cmd.exe 32 PID 2804 wrote to memory of 864 2804 cmd.exe 33 PID 2804 wrote to memory of 864 2804 cmd.exe 33 PID 2804 wrote to memory of 864 2804 cmd.exe 33 PID 2804 wrote to memory of 2228 2804 cmd.exe 34 PID 2804 wrote to memory of 2228 2804 cmd.exe 34 PID 2804 wrote to memory of 2228 2804 cmd.exe 34 PID 2196 wrote to memory of 696 2196 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe 35 PID 2196 wrote to memory of 696 2196 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe 35 PID 2196 wrote to memory of 696 2196 8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe"C:\Users\Admin\AppData\Local\Temp\8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\8a507ea21224d3c2ddb26c597893be39fc92e04038ad0483a4e85d22b4efd8b8.exe" MD53⤵PID:2416
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:864
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color b2⤵PID:696
-