Analysis
-
max time kernel
152s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 12:14
Static task
static1
Behavioral task
behavioral1
Sample
ea961e0543628f43b7a9f03fb22c73e9877d9342b0109238f8a7c9fcca0c5881.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ea961e0543628f43b7a9f03fb22c73e9877d9342b0109238f8a7c9fcca0c5881.exe
Resource
win10v2004-20230915-en
General
-
Target
ea961e0543628f43b7a9f03fb22c73e9877d9342b0109238f8a7c9fcca0c5881.exe
-
Size
2.7MB
-
MD5
0e594db191f9cd0ba1c6110ac900b65f
-
SHA1
5348f4837092bb5ee7d9f9660c06cfb236203c3b
-
SHA256
ea961e0543628f43b7a9f03fb22c73e9877d9342b0109238f8a7c9fcca0c5881
-
SHA512
752fdfcc13b1db2f9fb0179b91590bdb5ecdfebd0a065a8d2df6f6df956dccc5e120cab0757c10c73271ed6da6039576d0b7e88f8278a3adb45eafd9b633b53a
-
SSDEEP
49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlh924ve6MV/Dde:Q+8X9G3vP3AM1deLV/Dde
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe Token: SeShutdownPrivilege 2216 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea961e0543628f43b7a9f03fb22c73e9877d9342b0109238f8a7c9fcca0c5881.exe"C:\Users\Admin\AppData\Local\Temp\ea961e0543628f43b7a9f03fb22c73e9877d9342b0109238f8a7c9fcca0c5881.exe"1⤵PID:2448
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2216