Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
b80bb3753396384a10d87655d5c1a747d76d9427a4c871a57a1b73f9c17bb524.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b80bb3753396384a10d87655d5c1a747d76d9427a4c871a57a1b73f9c17bb524.exe
Resource
win10v2004-20230915-en
General
-
Target
b80bb3753396384a10d87655d5c1a747d76d9427a4c871a57a1b73f9c17bb524.exe
-
Size
3.3MB
-
MD5
48f0165345992dc59d94e5e2ab81abc6
-
SHA1
905780e4776f329f938a7dc30007a7832313bda0
-
SHA256
b80bb3753396384a10d87655d5c1a747d76d9427a4c871a57a1b73f9c17bb524
-
SHA512
1c24a80f6661190eff22459c719d9b4a64b133a844c54eee696d85987d2aaf6df038c16e97eb0fe59046edf785d61088241cf17245b6a34d19c684239f12a1af
-
SSDEEP
49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTloOsCQqp/k9kDxeUs:Q+8X9G3vP3AMqOsCQqrM3
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1584 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b80bb3753396384a10d87655d5c1a747d76d9427a4c871a57a1b73f9c17bb524.exe"C:\Users\Admin\AppData\Local\Temp\b80bb3753396384a10d87655d5c1a747d76d9427a4c871a57a1b73f9c17bb524.exe"1⤵PID:2404
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1584