Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe
Resource
win10v2004-20240802-en
General
-
Target
94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe
-
Size
14.9MB
-
MD5
75c5eab1eee7cce3d125165095a4869a
-
SHA1
cc8763dd506c9b268cad038ce65b31b1f0ca4fc8
-
SHA256
94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad
-
SHA512
38c57ad884c829c66d9b831671bdadc22006a7f67b988457cde34da00a91c484f668644ad1baa3ff0f54163aa3eb067883fcea726a19b4a830f11e37217f26f8
-
SSDEEP
393216:brgwWSOvB/aVGfXO3UwyNq7sR9v11uvu/5Ki:fgDzQV+e+q09NMvS5
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MAcccc\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\MAc.sys" 94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2540 94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe 2540 94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2540 94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe 2540 94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe"C:\Users\Admin\AppData\Local\Temp\94a1cc533001cbca25104768e76c14ffb9946926895a3e49d6dc7de1f0ecd2ad.exe"1⤵
- Sets service image path in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2540