Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
27/11/2023, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231020-en
General
-
Target
tmp.exe
-
Size
935KB
-
MD5
bebe3cc434f6afdb0f0cef4f13b78aa3
-
SHA1
b64b31a530a6308c636c6aae2852986182971017
-
SHA256
6f1c291cb4ee985a93a6f4b1c24b9f6e479149f074bc9575701f7c9793748550
-
SHA512
8d0a961894fa2782167d93625bbe51ba56ef328b21c754e9f20523c08cd934a7f955165881d8f5d9a2a7a587fcc59ddf6f821eee3b80b1a25f91e4f94a41c3a7
-
SSDEEP
24576://0JW4NPRsBu+SNbj0nqVktuQu3GYfpBhtD/:TCX10nqVkaWY3
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 340 help.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2568 set thread context of 2100 2568 tmp.exe 28 PID 2100 set thread context of 1284 2100 tmp.exe 20 PID 2100 set thread context of 340 2100 tmp.exe 31 PID 340 set thread context of 1284 340 help.exe 20 -
description ioc Process Key created \Registry\User\S-1-5-21-3618187007-3650799920-3290345941-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2100 tmp.exe 2100 tmp.exe 2100 tmp.exe 2100 tmp.exe 2100 tmp.exe 2100 tmp.exe 2100 tmp.exe 2100 tmp.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe 340 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1284 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2100 tmp.exe 1284 Explorer.EXE 1284 Explorer.EXE 340 help.exe 340 help.exe 340 help.exe 340 help.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2100 2568 tmp.exe 28 PID 2568 wrote to memory of 2100 2568 tmp.exe 28 PID 2568 wrote to memory of 2100 2568 tmp.exe 28 PID 2568 wrote to memory of 2100 2568 tmp.exe 28 PID 2568 wrote to memory of 2100 2568 tmp.exe 28 PID 2568 wrote to memory of 2100 2568 tmp.exe 28 PID 2568 wrote to memory of 2100 2568 tmp.exe 28 PID 1284 wrote to memory of 340 1284 Explorer.EXE 31 PID 1284 wrote to memory of 340 1284 Explorer.EXE 31 PID 1284 wrote to memory of 340 1284 Explorer.EXE 31 PID 1284 wrote to memory of 340 1284 Explorer.EXE 31 PID 340 wrote to memory of 1716 340 help.exe 34 PID 340 wrote to memory of 1716 340 help.exe 34 PID 340 wrote to memory of 1716 340 help.exe 34 PID 340 wrote to memory of 1716 340 help.exe 34 PID 340 wrote to memory of 1716 340 help.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2100
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD55d874a46532117f82095481976117fa1
SHA10a33fdef5084db25e24451dbde80238b487fbe78
SHA256d6ccab1423559c6cf50202bc81a4576f969aa9c275eaaeb9a2ac2c827cd60447
SHA512f0624277f3b4839c836291e1d1eb03cda875ba192243427afa967819b213f0cdade02f22e20b786b4680e4faaef20c045ad0a456d5f85fc04d3ab2e081ff4c61
-
Filesize
841KB
MD55fc6cd5d5ca1489d2a3c361717359a95
SHA15c630e232cd5761e7a611e41515be4afa3e7a141
SHA25685c8b8a648c56cf5f063912e0e26ecebb90e0caf2f442fd5cdd8287301fe7e81
SHA5125f9124a721f6b463d4f980920e87925098aa753b0fa2a59a3ff48b48d2b1a45d760fd46445414d84fb66321181cd2c82a4194361811114c15e35b42f838ab792