Analysis
-
max time kernel
152s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
f74509d7bb650a91a4b8f05442180c305a30cd80035361accf0b625bccb643d7.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f74509d7bb650a91a4b8f05442180c305a30cd80035361accf0b625bccb643d7.exe
Resource
win10v2004-20231020-en
General
-
Target
f74509d7bb650a91a4b8f05442180c305a30cd80035361accf0b625bccb643d7.exe
-
Size
3.4MB
-
MD5
64f490b11d08e7482cc74238a30ec172
-
SHA1
e4a5b35bd17fc7b63e6e5baab71e510f437a048e
-
SHA256
f74509d7bb650a91a4b8f05442180c305a30cd80035361accf0b625bccb643d7
-
SHA512
5b22665a35d8b5e6bebea3a30c4503aac1f648cdcc0e0ec62459bac79a90e4148cf0843cafe228c438451c751f36ea08fad33f78d9bb621f17b4aa96877d8724
-
SSDEEP
49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlq8RwMHs+8wTvjdJkGusAi:c+8X9G3vP3AMwcb8wTze5i
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1176 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe Token: SeShutdownPrivilege 1176 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f74509d7bb650a91a4b8f05442180c305a30cd80035361accf0b625bccb643d7.exe"C:\Users\Admin\AppData\Local\Temp\f74509d7bb650a91a4b8f05442180c305a30cd80035361accf0b625bccb643d7.exe"1⤵PID:2200
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1176