Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
626f41d30f8bfb66aaa4052fdc291ca22e2bb153f65021735366c333a7d63da7.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
626f41d30f8bfb66aaa4052fdc291ca22e2bb153f65021735366c333a7d63da7.exe
Resource
win10v2004-20231023-en
General
-
Target
626f41d30f8bfb66aaa4052fdc291ca22e2bb153f65021735366c333a7d63da7.exe
-
Size
3.2MB
-
MD5
69fdd27df7fe33fbc1fa5dec1b415c3a
-
SHA1
9058f2121655089830be7cb5df60cdc2d482bda9
-
SHA256
626f41d30f8bfb66aaa4052fdc291ca22e2bb153f65021735366c333a7d63da7
-
SHA512
d0ad815be113b9fdfa722ce4163802f5c18505e3aada9aa77caf38f6d8295a3c812902d2d345ff1d8f29a4237fe886ca32a2d487613b1874eca46a2e6bd5473f
-
SSDEEP
49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlkWVHNVhTrX3fBz38:c+8X9G3vP3AMuSHNVZDBzM
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1172 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe Token: SeShutdownPrivilege 1172 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\626f41d30f8bfb66aaa4052fdc291ca22e2bb153f65021735366c333a7d63da7.exe"C:\Users\Admin\AppData\Local\Temp\626f41d30f8bfb66aaa4052fdc291ca22e2bb153f65021735366c333a7d63da7.exe"1⤵PID:1956
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1172