Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19/09/2023, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
ee4a8f1c1591c01d387586f44986859e8c78993dd3f76f0163213914ac1f518c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ee4a8f1c1591c01d387586f44986859e8c78993dd3f76f0163213914ac1f518c.exe
Resource
win10v2004-20230915-en
General
-
Target
ee4a8f1c1591c01d387586f44986859e8c78993dd3f76f0163213914ac1f518c.exe
-
Size
3.4MB
-
MD5
cd15daa0bcff8fa4e806e4479fa3a4a7
-
SHA1
a7f893c58300b1a2fe0e04649ece0fb1bee1762a
-
SHA256
ee4a8f1c1591c01d387586f44986859e8c78993dd3f76f0163213914ac1f518c
-
SHA512
cadf23faad23e284173667014cced0dc49e51307d5785f78fd2b7eb2216d75cc1ef30ee89588a9feab63a17f22a4882aadc6f14ae27cbd97f34a5d519bb5eb39
-
SSDEEP
49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlYgRrCYoOC0ApN:c+8X9G3vP3AM7RrCeA/
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2224 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 2224 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee4a8f1c1591c01d387586f44986859e8c78993dd3f76f0163213914ac1f518c.exe"C:\Users\Admin\AppData\Local\Temp\ee4a8f1c1591c01d387586f44986859e8c78993dd3f76f0163213914ac1f518c.exe"1⤵PID:2416
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2224