Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe
Resource
win10v2004-20230703-en
General
-
Target
36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe
-
Size
12.4MB
-
MD5
3c7bb97a94263af82d85f57f761bfa1d
-
SHA1
9311093fada905de38fb998467836771e08828ef
-
SHA256
36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27
-
SHA512
3327b9c60a43d0ef081c46c18dacf8c863af5fdc9a94a5db19339d9bbdecff2f40d975af14d78e40d867f19c5e1e91fed2f82769f4d0325f09853e3f8b8937a6
-
SSDEEP
393216:eZNfDZTE6l5+1fVLFa4QIMqA7jheXLVxH3:eZNfi8KLFapFYXLVV3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" 36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" 36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Software\Microsoft\Internet Explorer\International\CpMRU 36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" 36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" 36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1464 36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe 1464 36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe 1464 36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe 1464 36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\36c047032d1342279cf4600066930f1983b1b735ff3e2c0bdc3c88f55ca16b27.exepack.tmp
Filesize2KB
MD51c32d1cd86f2eb33f1730613524e6cb4
SHA124e9162e4db09429f7d1a0c0d028c58e10fdfa09
SHA2560984d96d444d8f9926796ccd2961bd8cf0b2043e4a5d4e78bdc8b265f18c2ead
SHA5122dd9a50a2976532f7493dd54d41d3747edc504343434d9972c20e00073c8b0abebbec5aea50bf4fd6358d2e46c3f3918a8f86bc6adf8a4ffeac6299f0e23d9b0
-
Filesize
1KB
MD54cea1dec509b4e0f13a70fc3b1ccb59b
SHA1a9a2f8c1395f34247ab7053eb99eecbb471f08ab
SHA256da68a4bf82b3c416ffb008a1322102d448b51d2bfd65c434dabccbf03b630feb
SHA512edb62fe181c3252304e6c2faa5532d2df5ed92dca9f81fdedfa83a72b6bc9c9970d1e4148a822e5325eb3c1d6b3db5cb91f23933f0bcfa885680b78596d15edf
-
Filesize
1KB
MD513f8ccfecf4064dcc3a2070dfc792b9d
SHA1fd0b306a59302453c9c7b221d2c5ef5ae998ce2d
SHA2560894912b3200a44682a09ef304c089374cbe5c614e9dabef5a740b64924e5d76
SHA51277d0906853c15cf90e454a245f6bef9db4620b88b48b775b3b9e36581fb093ba761a51b399ff11df3db7a4606c635c84a0be467a7204748be154c83a06f28aa0