Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
17-11-2023 08:40
Static task
static1
Behavioral task
behavioral1
Sample
5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe
Resource
win10v2004-20231023-en
General
-
Target
5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe
-
Size
15.0MB
-
MD5
3acc5df7619c684470f50ca23ece4d9a
-
SHA1
dd6cecd0938930f54351b0b27766cbe7d0fa5332
-
SHA256
5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187
-
SHA512
9ade9edc3a6d6295800a4067f2713d287f27ac586b7b7be1b2247cfe815afb01d4ff2c0f658135581172a06655bb2f25879f54b03da2909baf6e29460ae2842e
-
SSDEEP
393216:tp/+Kdf/OM/LK5+fpSJsypUAOQtogx4YqSsNrPO3tvrLIgU:mKd1TEJfpUAOQtog+S0S3tvXIJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2632 wrote to memory of 3064 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 28 PID 2632 wrote to memory of 3064 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 28 PID 2632 wrote to memory of 3064 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 28 PID 2632 wrote to memory of 3064 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 28 PID 2632 wrote to memory of 2292 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 30 PID 2632 wrote to memory of 2292 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 30 PID 2632 wrote to memory of 2292 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 30 PID 2632 wrote to memory of 2292 2632 5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe"C:\Users\Admin\AppData\Local\Temp\5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe"2⤵PID:3064
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"2⤵PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5545a41064c18070826f020cb91ac2b28
SHA12ca3c4ef583abd35374d2abb0ba24556d69c33de
SHA256459c2e182ba61e9edbaca5f6798fd47a12b332ec003d7656255e1cbf6cb269ee
SHA5122c24b94322e7c0426f4886a49ae18ddaf7d8f673f5dd2ad5eacec8e7f93c21d5f2fc0cde7631285e9584dbbfb9e84463256f82c7cbf7d76c04f07dff2773ab2f
-
Filesize
1KB
MD5049e037dd0d07c1ef5b0c1be96597185
SHA105371bffcd02fab2c60d418f5fb42f78d73ba0ba
SHA256d416d91577fbdfaea035c062c57a8b5d4987dff7121cd74976d08f653fcaf034
SHA5129aa5857cfbe60b405b33cd903ff558313c260ff0cb48969ff2edac68c94c70063ed96d7c23a1170af25f6a5320aa1c3d8b3d50f24ff2f3e79993082e09c9d192
-
C:\Users\Admin\AppData\Local\Temp\5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exepack.tmp
Filesize2KB
MD5a286d905fb8ee250ce61df1a81cd92e3
SHA1d283637afd14c2f21db217ba939f5c4cce9d7938
SHA2562aaccb3bd84c8a83bc0ba2ee4d57e866096f626e966329b4fa1aa5997ccaae4b
SHA512f4765a6d66081feca9b4d490232c8cff931dba6b5429b72e354fece485da73209e9f898891697a8ff401581244606a8a511a60b359ee6ce7396b1e769e769689