Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01/02/2025, 10:23
Behavioral task
behavioral1
Sample
FINAL.bin
Resource
win7-20241010-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
FINAL.bin
Resource
win10v2004-20250129-en
3 signatures
150 seconds
General
-
Target
FINAL.bin
-
Size
295KB
-
MD5
45e149a6473dc0bf3cdcd88c010ecea8
-
SHA1
a3eced751c728f03a64155d65b391e0ac66896e7
-
SHA256
c4d6a46a2ae90f0f20bf09fda8a74127ae7dc51fc22a7b1a167d55ab25b1f77e
-
SHA512
b065e398ac8b38e6c8c888170c3edf919462b4aa941c4c86882bf821f9ee76b039fcf29729020c415753a33eb65dee62c12c4ed1c2cd1d20956976e97102244e
-
SSDEEP
6144:lWHMOd10kD5dpEuIw7egSd9bVdj/wpcroMY5Pl9QaKsOt/GedgR:l5Od/D59negU/dAc+PMhtruR
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2560 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2560 3064 cmd.exe 31 PID 3064 wrote to memory of 2560 3064 cmd.exe 31 PID 3064 wrote to memory of 2560 3064 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FINAL.bin1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\FINAL.bin2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2560
-