Analysis
-
max time kernel
75s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 08:37
Behavioral task
behavioral1
Sample
96d8da6111d63346fbb25cba3aba283181de62c2ae9b4f1b7da837086050ba95.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96d8da6111d63346fbb25cba3aba283181de62c2ae9b4f1b7da837086050ba95.exe
Resource
win10v2004-20241007-en
General
-
Target
96d8da6111d63346fbb25cba3aba283181de62c2ae9b4f1b7da837086050ba95.exe
-
Size
3.7MB
-
MD5
9b3216b625d7e42e242acc51c6798ab9
-
SHA1
34a507306d9594f6545e3a9cad721b92dd333ede
-
SHA256
96d8da6111d63346fbb25cba3aba283181de62c2ae9b4f1b7da837086050ba95
-
SHA512
2870816c0089bcc32f5730a2d79e8715089594ae82570206af5273c1065694b1a2d003b24e06f10c498e4b93e6c8dda562e55148913e4ef66244b99a30ae1a85
-
SSDEEP
49152:CC+KgoeZTwGgKhwLtUzmkJzby90bO7n5vmQQR4dzmJqFyL68Z5r7wc6DUipydIBO:CCaVZV4LtU6IS53z98zVxIOtQAN4Iuu
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\SystemHost = "C:\\Users\\Admin\\AppData\\Roaming\\sysfile\\bghost.exe" 96d8da6111d63346fbb25cba3aba283181de62c2ae9b4f1b7da837086050ba95.exe -
resource yara_rule behavioral1/memory/2848-0-0x0000000000E90000-0x000000000191A000-memory.dmp upx behavioral1/memory/2848-1-0x0000000000E90000-0x000000000191A000-memory.dmp upx