Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
05a4b4be6db42e565a728013ffe10d882ea644933bd519e46a4ebe5db2788d62.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
05a4b4be6db42e565a728013ffe10d882ea644933bd519e46a4ebe5db2788d62.exe
Resource
win10v2004-20230703-en
General
-
Target
05a4b4be6db42e565a728013ffe10d882ea644933bd519e46a4ebe5db2788d62.exe
-
Size
2.8MB
-
MD5
f7d9da69f4f26b1f2941b369da6ad52b
-
SHA1
e11c76ac88459f491bee85fc7f95b5689359ff23
-
SHA256
05a4b4be6db42e565a728013ffe10d882ea644933bd519e46a4ebe5db2788d62
-
SHA512
29a0e60c5b3aff8c945b9e8c36b747d6e9f0ed378ccff3f3b327d4bf75a92538b9e1fef9bae7254455b5a7b99c49c83d085b7ec8bc572c26ee5b51c408fe1c90
-
SSDEEP
49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlBl6L9TDbnM1WrhR:Q+8X9G3vP3AMuvwWP
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2168 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe Token: SeShutdownPrivilege 2168 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05a4b4be6db42e565a728013ffe10d882ea644933bd519e46a4ebe5db2788d62.exe"C:\Users\Admin\AppData\Local\Temp\05a4b4be6db42e565a728013ffe10d882ea644933bd519e46a4ebe5db2788d62.exe"1⤵PID:2188
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2168