Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 15:55
Static task
static1
Behavioral task
behavioral1
Sample
index_
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
index_
Resource
win10v2004-20240709-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
index_
-
Size
256KB
-
MD5
e117b0322120b1f5f3d54cad23d785f6
-
SHA1
2fc8781c832da47d18e806617f95f26ddc9251b0
-
SHA256
bff94684a8e6dc9a9dd6ae5f82a964c6524ddfde5c510008f638ebb8e5416072
-
SHA512
b196a6dbfce89dace5bb207c9d6aaa00d5d9abae551d774c5050230a01b2d86dc19c90ac9f08b3e2ddc6cf96cd51ab29b8d9849f75b6ec6c4e3e2a409d935d8a
-
SSDEEP
3:LstlXllllklkXl3EQL//Pnssl/:LsXplPUQLEsl
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2248 3052 rundll32.exe 35 PID 3052 wrote to memory of 2248 3052 rundll32.exe 35 PID 3052 wrote to memory of 2248 3052 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\index_1⤵PID:2688
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2780
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\index_1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\index_2⤵PID:2248
-