Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe
Resource
win10v2004-20220812-en
General
-
Target
536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe
-
Size
72KB
-
MD5
6843e1e5e5273f85c4e5cc2758577aee
-
SHA1
af708b237bd0905f1411b058ca7cbade1af00c59
-
SHA256
536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749
-
SHA512
9718809b23b00e57406cc6727208f0faf85c5fdd707d65ef34590effe5680069ef19ce2c0d6666c59acd2c6d9ea80364e4c14395b729d2bdc230b5b138b1d76d
-
SSDEEP
768:9v8s3i6E5nXfUWPYfIc/Qi3qEBQpIGZlvRQep93qEBjUWPYfIc/QAnXZs3i6ENv:H3i6EBXlLOUpIGjJQep9NLMXy3i6E
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WebCounter.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WebCounter.exe -
Executes dropped EXE 1 IoCs
pid Process 4908 WebCounter.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run 536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WebCounter = "C:\\Users\\Admin\\AppData\\Roaming\\WebCounter\\WebCounter.exe" 536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5000 536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe 5000 536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe 5000 536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe 4908 WebCounter.exe 4908 WebCounter.exe 4908 WebCounter.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5000 wrote to memory of 4908 5000 536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe 82 PID 5000 wrote to memory of 4908 5000 536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe 82 PID 5000 wrote to memory of 4908 5000 536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe"C:\Users\Admin\AppData\Local\Temp\536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Roaming\WebCounter\WebCounter.exeC:\Users\Admin\AppData\Roaming\WebCounter\WebCounter.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56843e1e5e5273f85c4e5cc2758577aee
SHA1af708b237bd0905f1411b058ca7cbade1af00c59
SHA256536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749
SHA5129718809b23b00e57406cc6727208f0faf85c5fdd707d65ef34590effe5680069ef19ce2c0d6666c59acd2c6d9ea80364e4c14395b729d2bdc230b5b138b1d76d
-
Filesize
72KB
MD56843e1e5e5273f85c4e5cc2758577aee
SHA1af708b237bd0905f1411b058ca7cbade1af00c59
SHA256536ff7b8109a7ef3534afc660a3df65c82577f506c67be7e4c4340e75eefe749
SHA5129718809b23b00e57406cc6727208f0faf85c5fdd707d65ef34590effe5680069ef19ce2c0d6666c59acd2c6d9ea80364e4c14395b729d2bdc230b5b138b1d76d