Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
0e6386e5dc052759bf904ff4320b38a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e6386e5dc052759bf904ff4320b38a8.exe
Resource
win10v2004-20231215-en
General
-
Target
0e6386e5dc052759bf904ff4320b38a8.exe
-
Size
7.9MB
-
MD5
0e6386e5dc052759bf904ff4320b38a8
-
SHA1
0e9c47ef6fcb8193ab610edef7b3bd3532a432f9
-
SHA256
efa68a1d46d22e8d61394a1905e8c539cb909805d4128355093111d7f22acf27
-
SHA512
df2a0c8046cc3075f220501ce99b997c624090c2e63ac48f329361cdd59493933f2e2288a8f7d9befec96afc195a48c0d3ea8fbf5c5df24add93331635ca9431
-
SSDEEP
196608:0Oazg7DS8Oazg7DS8Oazg7DS8Oazg7DSv:sg7uEg7uEg7uEg7uv
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2972 7D57AD13E21.exe 2956 Scegli_nome_allegato.exe 2920 7D57AD13E21.exe -
Loads dropped DLL 3 IoCs
pid Process 3020 0e6386e5dc052759bf904ff4320b38a8.exe 3020 0e6386e5dc052759bf904ff4320b38a8.exe 3020 0e6386e5dc052759bf904ff4320b38a8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2972 set thread context of 2920 2972 7D57AD13E21.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2712 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2956 Scegli_nome_allegato.exe 2956 Scegli_nome_allegato.exe 2956 Scegli_nome_allegato.exe 2920 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2712 3020 0e6386e5dc052759bf904ff4320b38a8.exe 28 PID 3020 wrote to memory of 2712 3020 0e6386e5dc052759bf904ff4320b38a8.exe 28 PID 3020 wrote to memory of 2712 3020 0e6386e5dc052759bf904ff4320b38a8.exe 28 PID 3020 wrote to memory of 2712 3020 0e6386e5dc052759bf904ff4320b38a8.exe 28 PID 3020 wrote to memory of 2972 3020 0e6386e5dc052759bf904ff4320b38a8.exe 30 PID 3020 wrote to memory of 2972 3020 0e6386e5dc052759bf904ff4320b38a8.exe 30 PID 3020 wrote to memory of 2972 3020 0e6386e5dc052759bf904ff4320b38a8.exe 30 PID 3020 wrote to memory of 2972 3020 0e6386e5dc052759bf904ff4320b38a8.exe 30 PID 3020 wrote to memory of 2956 3020 0e6386e5dc052759bf904ff4320b38a8.exe 31 PID 3020 wrote to memory of 2956 3020 0e6386e5dc052759bf904ff4320b38a8.exe 31 PID 3020 wrote to memory of 2956 3020 0e6386e5dc052759bf904ff4320b38a8.exe 31 PID 3020 wrote to memory of 2956 3020 0e6386e5dc052759bf904ff4320b38a8.exe 31 PID 2972 wrote to memory of 2920 2972 7D57AD13E21.exe 35 PID 2972 wrote to memory of 2920 2972 7D57AD13E21.exe 35 PID 2972 wrote to memory of 2920 2972 7D57AD13E21.exe 35 PID 2972 wrote to memory of 2920 2972 7D57AD13E21.exe 35 PID 2972 wrote to memory of 2920 2972 7D57AD13E21.exe 35 PID 2972 wrote to memory of 2920 2972 7D57AD13E21.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e6386e5dc052759bf904ff4320b38a8.exe"C:\Users\Admin\AppData\Local\Temp\0e6386e5dc052759bf904ff4320b38a8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2712
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5c1ae195d42fe85aed6a7f409a584a35b
SHA1db5154473d77b591885a60f41ba42335903817b0
SHA256f96e4db4b460d75a3d5336c4455d143a437742d528b74f736cc59cfda305cd63
SHA512e93a346fb4ac4cc0fbccf3a1dc30a2f02bec6b7763c227da302c4add39fb8c5f955f4ceaadda350e60264b8ec9fe57d2f799ba390a27761f31035a7d922cea75
-
Filesize
640KB
MD5dd69873b774093597e78e6f105329f17
SHA19f1219fe92ea91563c561e7c9f1706bf5b31176f
SHA256f0e7696cc280effcd351c2c61b03670f26e8f3f4b6cf1d8e1630c188cdabb057
SHA512be3ac421aecfb19985cd08d9b3c48ab6d54354fd8f9d75a98605778f7ee539d4c207676ab8566b418a7c564371e1ebaa9b41fff2eee8b869db7a48d7951e7b3f
-
Filesize
7.9MB
MD5534a730ab202db0f2f30a5d844cdb002
SHA1a0416f17dea4519728bde7106bde091a4fd2e00a
SHA256eb3e9bbb49985623340eb9a22b9a9e07118f8e7fbef4a64fbe4447b4fe1c2ded
SHA5126a2bfa7a5464bf360ea11861a5c74afe79a46dd67360740200e8022fb70e3499b4db43bf6acfb96ea31544df65a16f1b224c1910461d2a76de101e257ca15aa1
-
Filesize
2.7MB
MD5f5b7cb93d07a444a21cc08267974278a
SHA1fd2b8a6d162c963ecf0216adfdf1a0d28ae00b4a
SHA256ad3eff6c8595af785d5c2dd9e3e02d6fe5f51d553d2b8bc59b68d95b105db17f
SHA5129880d62879368695d0af3f6d08dec3d2c9406965619c1ea440f81bbfd4bd7c3216a401734edb65ee06bd5469329738e596e4628c36fb9f14b9142263b39abc62
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad
-
Filesize
2.6MB
MD5b657638213e762002e381280010148be
SHA138c0add26cc93653c3e421b7d5e324afc1260b1c
SHA256afc3283969460aca917571786a006ca0d773c1f0f531989f77b4f8d858590d29
SHA51278f9f80c82fc99e2ce8bd347848f66e9217b2393c7f9649f9859157b204f324b3bb5811bf9ebc896cffef7d5dde087bf8d200f005fe87535792673a134e60668
-
Filesize
2.2MB
MD5f5f127b2d0ab8e61db728b0da1e86847
SHA1bac92dcba690e4419a55c3fbc472908c9992a888
SHA25612d00ecfc9e067746c6e6acc604460798b56db7b73a612bd1e02c0f725155882
SHA512675a9f89f60c8193ce11ad49345dd5f5511cd02ec5730bfa4f05278553341b5ca47e6427139a3363d225c626c54f75c4c1831af5e7784772eb171694bf9cb9b1