Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 12:19
Static task
static1
Behavioral task
behavioral1
Sample
e8d1c9e54c882d3ffb93825512c9369436886f0e878dde14fa337c4a47ce9a4c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e8d1c9e54c882d3ffb93825512c9369436886f0e878dde14fa337c4a47ce9a4c.exe
Resource
win10v2004-20230915-en
General
-
Target
e8d1c9e54c882d3ffb93825512c9369436886f0e878dde14fa337c4a47ce9a4c.exe
-
Size
3.0MB
-
MD5
4613029dffc713ecb26148e53770a1ca
-
SHA1
6ef081672d6beabafff54b4a22f4ab39caa7c0c0
-
SHA256
e8d1c9e54c882d3ffb93825512c9369436886f0e878dde14fa337c4a47ce9a4c
-
SHA512
9d374e5e269d5fd29360679565cc3a37f36d7ce9b557a52a7e3feabffed6d5d3be242673d3c4d94b4dedf42afc881f26d027608c174b21663714d42062d83bb2
-
SSDEEP
49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlyNe8BhG4GYmVncjnZ:Q+8X9G3vP3AMEgwnZ
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2072 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe Token: SeShutdownPrivilege 2072 explorer.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8d1c9e54c882d3ffb93825512c9369436886f0e878dde14fa337c4a47ce9a4c.exe"C:\Users\Admin\AppData\Local\Temp\e8d1c9e54c882d3ffb93825512c9369436886f0e878dde14fa337c4a47ce9a4c.exe"1⤵PID:2324
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2072