Analysis
-
max time kernel
142s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe
Resource
win10v2004-20230915-en
General
-
Target
9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe
-
Size
8.5MB
-
MD5
cac63ffdff9b02b0c6249fc69e4afc7a
-
SHA1
fed6ae4c336001eafc980031992d8e476f27f179
-
SHA256
9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636
-
SHA512
984f9a8a68a95b8482bf8761bc13f93a55e0d7e10272a9b3b9744a2d40f82b8a6b7480f4fcf63fec0807eabadc8f4cfaf67dab12e53092242d4ce550760abea4
-
SSDEEP
196608:CogPNCqjxm59Pgdd80J22lmVE/x1x8Tn9vSl9gVNc/8fjb8gv:wPN9q9Pfn0mVEigl9ecG/v
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main 9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2472 9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2472 9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2472 9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe 2472 9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe 2472 9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe 2472 9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe"C:\Users\Admin\AppData\Local\Temp\9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9d8637094f615838e36315da5e5c4d772b5e54774023461f91ad3f15c0a9e636.exepack.tmp
Filesize2KB
MD5d2298d1a5d94a376ddf19a44bb60bb10
SHA12076110ecb93c6528071e592e130a6bf28c36d6a
SHA256bdcc171155e731261f168f75ec1e52e07cd6d9d66f1871a271da89524c1034f7
SHA51284805045778b0acb026a58ee70c7d8508864cbc34eba84d330361cfa9520547c297830097ca4d53621c8101e2afde948301ec6bb09298c6b964935eac1810044
-
Filesize
1KB
MD51b769e855c9e24639c744f5864d3d40e
SHA1a3e291af668b008ef7399ecd620cecaecd79f8c5
SHA25650fb2271974f2728061b7697e76180b1986adf0f7600ee2a7d6b938b4965786e
SHA512478b0e944858adbe1cb2a632902588da3d62a6a7869f324deed168276a8dc476c71f324211077a071f05c279fa5867e4bc28667899ada4f65791becf89e3e2a5
-
Filesize
1KB
MD5d507bd39b77bceb870e1608068963763
SHA17b22f8146d737c209b617007f8568291c8527fb8
SHA2569790cac03d2e7d06560663943e127d3a579fcf569664616f7fa2496b7074ceb5
SHA5126ba52a9d21a9c0711d7bd2f7b8621a26859b7101e5a2847340d7e58e0c9eec0149d2f883d41d6002aa01bfc9470ef52f2fdd0c1d22abfac750ddad66d559c6d8