Analysis
-
max time kernel
151s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
84707ad3be4de1e1f10e8b7df5b4bfba55316555977838c87088187256da32b5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
84707ad3be4de1e1f10e8b7df5b4bfba55316555977838c87088187256da32b5.exe
Resource
win10v2004-20230915-en
General
-
Target
84707ad3be4de1e1f10e8b7df5b4bfba55316555977838c87088187256da32b5.exe
-
Size
3.6MB
-
MD5
83bc0e76cd70ad85a88a953a0d392766
-
SHA1
667cc08ee2e5d41cb212ce13db8d8faff0c51ea9
-
SHA256
84707ad3be4de1e1f10e8b7df5b4bfba55316555977838c87088187256da32b5
-
SHA512
e8cceb1114da683d7746c4a52c196388b5c584d2bc9087e5816632438478534ff81b4ea56ceaf382133e022af36cb518fc042f6fb3c3d274668ce2d8e28b7ff0
-
SSDEEP
49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTl91xlZUtsmvgDUnpyeGMtWVaqvk:c+8X9G3vP3AMhZzDEyTTaok
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2344 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe Token: SeShutdownPrivilege 2344 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe 2344 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\84707ad3be4de1e1f10e8b7df5b4bfba55316555977838c87088187256da32b5.exe"C:\Users\Admin\AppData\Local\Temp\84707ad3be4de1e1f10e8b7df5b4bfba55316555977838c87088187256da32b5.exe"1⤵PID:2992
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2344