Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
23/11/2023, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe
Resource
win10v2004-20231025-en
General
-
Target
95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe
-
Size
13.1MB
-
MD5
f90b600c601de14e5341a8c52cccd782
-
SHA1
10433f5057ccd1c6f0a2f4b77afaf3731e6c84bd
-
SHA256
95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88
-
SHA512
dba97f7f48a7c69275572a9a67d312bb417575ebfb2b24b76e0179739c3aa18849952fe2a4403568c9aed704de7e65a74e60da37a67a717a1c91588db91811d5
-
SSDEEP
393216:3VhgLN/qpGQLRetgWGSYM0ZQLWV8w4NaFsWmyvrM5:3VhgR/tFGWVaywCf5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main 95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2576 95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2576 95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe 2576 95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe 2576 95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe 2576 95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe"C:\Users\Admin\AppData\Local\Temp\95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55d731f6d5eab143f4a22c741874a8d23
SHA155afe920fc815b9293a03ca94a49b5d249d862c3
SHA2561ea6956b3ecba807732871d5c4ce547b21fe7c7695c71af4b2f6c94ec1ddc9d3
SHA512ac923ffe0485cc56793042d5d4511ee3db770a4c34794c77dedd899fe5777dd6f7f7a7cc98c6768a0c1a1dcf006d179d9605addc88582455d590a95b246aa6c1
-
Filesize
1KB
MD51b70cd4263d0a8895508e29b6f9345a1
SHA126831620e8f1adbf7977edb265b8060ee60b2e86
SHA2560966f13fa9b1bfbb6bc5952f66a1d9c48b38d7e5c21261f5b5e9a6a6c41f4441
SHA512a8ef5f22b88e67775b779ea1bd47d5d035467c9018ad2cbc9121dd26580dd0822461b1e08006053aa58ab019db954b826d72825c2c6701e4ec5cdf4fbc4d5f60
-
C:\Users\Admin\AppData\Local\Temp\95f2661fa4a0f43619d51af30a0458280bd5d7c5d7e6137dec6387333682fa88.exepack.tmp
Filesize2KB
MD5814ac4d365041b4a44189a06f5fcc3be
SHA10a3809ae56fc40a837521efc5e26caf974e4c616
SHA2566c557d45870a330a766a29d6a6f94775c303d7c9d6b1e6afc36bd63541ff4c0c
SHA51268b5dde03e0cfcac463c884b5fdc0974a2060f4cfd1ea7337e481699cc28367a9b3a25e4ddcdf0bc7fc79cded415e6e1db26d40e30b141073e80a2f76cec5f29