Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe
Resource
win10v2004-20240802-en
General
-
Target
f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe
-
Size
941KB
-
MD5
61f9e6be7cae28b88ea8481acbe0c2c4
-
SHA1
79f3eae9574c2a5e31483748ed4fb88d7ecd2d6f
-
SHA256
f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3
-
SHA512
fa0c63dd8c837f2368a3c858edb97b7f1208fe18cec09e1cb24d0bf4f0e073d8e30bc50d22b279ede734394b661eda0e7a16144a1957b282fffccf3007470378
-
SSDEEP
24576:CLPI+JIfpe0ba/gDI7/dccQ8hxQuP6qXxOt0khg0lPDQMAI:CEnRK/0Iy0XQRqXxREvhDQQ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tvkleyi = "C:\\Users\\Admin\\AppData\\Roaming\\Tvkleyi.exe" f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2496 f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2496 f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe Token: SeDebugPrivilege 2496 f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2496 wrote to memory of 4832 2496 f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe 30 PID 2496 wrote to memory of 4832 2496 f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe 30 PID 2496 wrote to memory of 4832 2496 f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe"C:\Users\Admin\AppData\Local\Temp\f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2496 -s 6042⤵PID:4832
-