Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
9f599a3d8bbc9683e6fda0203f3cb3033a2ab22a9d109fef623c39cb9b723e23.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9f599a3d8bbc9683e6fda0203f3cb3033a2ab22a9d109fef623c39cb9b723e23.exe
Resource
win10v2004-20230915-en
General
-
Target
9f599a3d8bbc9683e6fda0203f3cb3033a2ab22a9d109fef623c39cb9b723e23.exe
-
Size
3.5MB
-
MD5
3d162c91c6c990b71561ea5e459be5fc
-
SHA1
4101fc6ee6c3bfdda8da357f2c1b1bcb6bd7917a
-
SHA256
9f599a3d8bbc9683e6fda0203f3cb3033a2ab22a9d109fef623c39cb9b723e23
-
SHA512
922ba961e872a7df6498f74f3171f6164f9d94b216d832e1751c89aada46d4542288c73860fdbf459ffb6e5e716b450846a5f17ebf9be66d628e57d263d3dc95
-
SSDEEP
49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlmwLb21wEH5wdQkXoykwfK:c+8X9G3vP3AM9b21H5xyRfK
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f599a3d8bbc9683e6fda0203f3cb3033a2ab22a9d109fef623c39cb9b723e23.exe"C:\Users\Admin\AppData\Local\Temp\9f599a3d8bbc9683e6fda0203f3cb3033a2ab22a9d109fef623c39cb9b723e23.exe"1⤵PID:2244
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1264