Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2023 19:44
Behavioral task
behavioral1
Sample
5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe
Resource
win10v2004-20230220-en
General
-
Target
5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe
-
Size
1.2MB
-
MD5
7819aded07f95ebb40f51240514d6097
-
SHA1
3b0c674320f1e1e7401f8e49c0af22f10963a99f
-
SHA256
5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e
-
SHA512
c55ab9344ad0b6ee3c3ab6d5833ae1867b28efd97599b452d959a66543eb8e65b10ec1aa6377219a6d35c410643fb35084b9d77ef117c67c691dec1623c23e1f
-
SSDEEP
24576:EnXIlq0d3uCOle3bcSNR+Jr2zZ8zYzAKOorc+B2Cnoy2KFg:Et6dsMAKjcDWF
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exepid process 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 24 IoCs
Processes:
5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4a00310000000000000000001200383837370000360008000400efbe00000000000000002a000000000000000000000000000000000000000000000000003800380037003700000014000000 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 5e0031000000000000000000100050726f6772616d4461746100440008000400efbe00000000000000002a00000000000000000000000000000000000000000000000000500072006f006700720061006d00440061007400610000001a000000 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exepid process 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exedescription pid process Token: SeDebugPrivilege 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe Token: SeDebugPrivilege 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 1692 DllHost.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exemsconfig.exemsconfig.exepid process 1720 5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe 1920 msconfig.exe 1920 msconfig.exe 1784 msconfig.exe 1784 msconfig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe"C:\Users\Admin\AppData\Local\Temp\5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1720
-
C:\Windows\System32\msconfig.exe"C:\Windows\System32\msconfig.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:1920
-
C:\Windows\System32\msconfig.exe"C:\Windows\System32\msconfig.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:1784
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5e34b52fb24804b7f2709926d57582f34f1d6b351284a15d52d0194635b2dc7e.jpg
Filesize1KB
MD5edea599abe007c19c028c6917a16cd0e
SHA1f6c89bbd3167c265b8f1f946c6c5a4e5d5a93771
SHA256c7be415cca4726d7ed856ce13481862c96978a5dd880b926cc6c29f95b6d57dd
SHA5129e839c1d91b067fdd9e4356b99dbfc1a46dff9c796bd9c4455d1cf9b6da46ecc64b0c35be47382f5f2b059876ab7a8f686ec304f54b56c24a358e4868fd46b16
-
Filesize
157KB
MD5a5fe51b8ce661a935a165803c65a4bf1
SHA1f62c77748f4ea5ab4c1b0c987e568e04e86e43ee
SHA2565a190418b2f5e7fc18ad27ac315b21df185bba8c0e33dc0b3ce60fe07ef34441
SHA5126b52f099b0b9d789663bc6fe833c7212c09d5e6e50fceabfdb9e94bcd1ef911fb3304b247da5fc90ac4739cfd485729883d2c5f64af4f87681fdea1216fc1017