Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe
Resource
win10v2004-20220901-en
General
-
Target
096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe
-
Size
430KB
-
MD5
0293b0e8ea13001b4843d5e4789fecb5
-
SHA1
40b0c6fe4282dedf4ac6bf5b33cd4c5043acec4c
-
SHA256
096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397
-
SHA512
9250305ebdf939a7df43494f72f6daf6ac2a5b80ec5538daf4a645cfd4b30cbf112771f71465900b1bd8bf5af075540aac51e634c63136483359245e46e9f26d
-
SSDEEP
6144:HSVmOP10ZtoTBJ+MYoitoEARvQNHF0mjbiwE5C+naXCUjHgILr/P:EmO6ZtoTr9JRv2HumjbM1aXC+r/P
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1136 810F3B42B36.exe 2044 Iu81739.exe -
Loads dropped DLL 4 IoCs
pid Process 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe 1136 810F3B42B36.exe 1136 810F3B42B36.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Iu81739.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\4W1W8C6FXUVEVJZYNIMDKNGKPZN = "C:\\Bsdhga6.zip\\810F3B42B36.exe /q" Iu81739.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" Iu81739.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PhishingFilter Iu81739.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" Iu81739.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery Iu81739.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" Iu81739.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DBControl Iu81739.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DBControl 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe 1136 810F3B42B36.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe 2044 Iu81739.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe Token: SeDebugPrivilege 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe Token: SeDebugPrivilege 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe Token: SeDebugPrivilege 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe Token: SeDebugPrivilege 1136 810F3B42B36.exe Token: SeDebugPrivilege 1136 810F3B42B36.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe Token: SeDebugPrivilege 2044 Iu81739.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1136 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe 27 PID 1948 wrote to memory of 1136 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe 27 PID 1948 wrote to memory of 1136 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe 27 PID 1948 wrote to memory of 1136 1948 096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe 27 PID 1136 wrote to memory of 2044 1136 810F3B42B36.exe 28 PID 1136 wrote to memory of 2044 1136 810F3B42B36.exe 28 PID 1136 wrote to memory of 2044 1136 810F3B42B36.exe 28 PID 1136 wrote to memory of 2044 1136 810F3B42B36.exe 28 PID 1136 wrote to memory of 2044 1136 810F3B42B36.exe 28 PID 1136 wrote to memory of 2044 1136 810F3B42B36.exe 28 PID 2044 wrote to memory of 1948 2044 Iu81739.exe 16 PID 2044 wrote to memory of 1948 2044 Iu81739.exe 16 PID 2044 wrote to memory of 1948 2044 Iu81739.exe 16 PID 2044 wrote to memory of 1948 2044 Iu81739.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe"C:\Users\Admin\AppData\Local\Temp\096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Bsdhga6.zip\810F3B42B36.exe"C:\Bsdhga6.zip\810F3B42B36.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Iu81739.exe"C:\Users\Admin\AppData\Local\Temp\Iu81739.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5b3c5b91d03cbe09f185ac4dcbf3c379b
SHA18407aff0e02e2f03bc4c12d630e71e4f734eb787
SHA25627b1e551bf985246b49e3b7b3b42c6fafa684c170f8edbcae738a6711e453c0e
SHA5127a9ec93d72cb90ba1a779210cdc94cc5c8d5bff8dc75066e9f8296d326b83da4439ec208871619c456056a24a2222dcc64f0d10257f4745b4ca6718aae17c686
-
Filesize
430KB
MD50293b0e8ea13001b4843d5e4789fecb5
SHA140b0c6fe4282dedf4ac6bf5b33cd4c5043acec4c
SHA256096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397
SHA5129250305ebdf939a7df43494f72f6daf6ac2a5b80ec5538daf4a645cfd4b30cbf112771f71465900b1bd8bf5af075540aac51e634c63136483359245e46e9f26d
-
Filesize
430KB
MD50293b0e8ea13001b4843d5e4789fecb5
SHA140b0c6fe4282dedf4ac6bf5b33cd4c5043acec4c
SHA256096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397
SHA5129250305ebdf939a7df43494f72f6daf6ac2a5b80ec5538daf4a645cfd4b30cbf112771f71465900b1bd8bf5af075540aac51e634c63136483359245e46e9f26d
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
430KB
MD50293b0e8ea13001b4843d5e4789fecb5
SHA140b0c6fe4282dedf4ac6bf5b33cd4c5043acec4c
SHA256096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397
SHA5129250305ebdf939a7df43494f72f6daf6ac2a5b80ec5538daf4a645cfd4b30cbf112771f71465900b1bd8bf5af075540aac51e634c63136483359245e46e9f26d
-
Filesize
430KB
MD50293b0e8ea13001b4843d5e4789fecb5
SHA140b0c6fe4282dedf4ac6bf5b33cd4c5043acec4c
SHA256096c225f39e1b4274a23ad15392e71da94d5bb7e9b61e1a3d6b50bcacf7cc397
SHA5129250305ebdf939a7df43494f72f6daf6ac2a5b80ec5538daf4a645cfd4b30cbf112771f71465900b1bd8bf5af075540aac51e634c63136483359245e46e9f26d
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be