Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 19:41
Behavioral task
behavioral1
Sample
2a7f131c344009545ede24b5692c14cdebf3d1e8a64b952ebd55b5cef226c6be.exe
Resource
win7-20240705-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a7f131c344009545ede24b5692c14cdebf3d1e8a64b952ebd55b5cef226c6be.exe
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
2a7f131c344009545ede24b5692c14cdebf3d1e8a64b952ebd55b5cef226c6be.exe
-
Size
9.3MB
-
MD5
209923b0854cdb5dd8d1d592977120e7
-
SHA1
f9a819bf5045a818c58786205072a353b0843409
-
SHA256
2a7f131c344009545ede24b5692c14cdebf3d1e8a64b952ebd55b5cef226c6be
-
SHA512
33e0fd3c149f78c2941a59e6c269dae352340790d12e29371ccce69b820ac8802d21af65ab083f4ae732ad34b50f2dedaa908f264b91bc4b150016923d3b3e3f
-
SSDEEP
98304:BONStiNrv3pmTGKy1WKNgFCWFiz6E10y+5ERMfi:NiNrvOTpFMn10f
Score
1/10
Malware Config
Signatures
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 4756 reg.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2484 wrote to memory of 4756 2484 2a7f131c344009545ede24b5692c14cdebf3d1e8a64b952ebd55b5cef226c6be.exe 84 PID 2484 wrote to memory of 4756 2484 2a7f131c344009545ede24b5692c14cdebf3d1e8a64b952ebd55b5cef226c6be.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7f131c344009545ede24b5692c14cdebf3d1e8a64b952ebd55b5cef226c6be.exe"C:\Users\Admin\AppData\Local\Temp\2a7f131c344009545ede24b5692c14cdebf3d1e8a64b952ebd55b5cef226c6be.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\reg.exereg query HKLM\SYSTEM\ControlSet001\Enum\USBSTOR2⤵
- Modifies registry key
PID:4756
-