Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
2870998c5e9b853907fad77b6898533f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2870998c5e9b853907fad77b6898533f.exe
Resource
win10v2004-20231215-en
General
-
Target
2870998c5e9b853907fad77b6898533f.exe
-
Size
15.9MB
-
MD5
2870998c5e9b853907fad77b6898533f
-
SHA1
f6158edc3e0f4f5557260253706e2d7281b43538
-
SHA256
ff775c181e9d9d4f1e56966171b8e9b55a24fdf93f73462bc3f98ff0a36d453d
-
SHA512
883531ed4d923ebc2c8e0868f1c1944420b6534e40bbc8602c5407767aca26d6f3a99ac473195bb4333342fbad009e8a3d111dc71e7cc2b140d800d678c95ac6
-
SSDEEP
393216:ug7uUg7uUg7uUg7uUg7uUg7uUg7uUg7uN:jSJSJSJSJSJSJSJSN
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2964 7D57AD13E21.exe 2800 Scegli_nome_allegato.exe 2892 7D57AD13E21.exe -
Loads dropped DLL 3 IoCs
pid Process 3012 2870998c5e9b853907fad77b6898533f.exe 3012 2870998c5e9b853907fad77b6898533f.exe 3012 2870998c5e9b853907fad77b6898533f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2964 set thread context of 2892 2964 7D57AD13E21.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3044 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2800 Scegli_nome_allegato.exe 2800 Scegli_nome_allegato.exe 2800 Scegli_nome_allegato.exe 2892 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3044 3012 2870998c5e9b853907fad77b6898533f.exe 28 PID 3012 wrote to memory of 3044 3012 2870998c5e9b853907fad77b6898533f.exe 28 PID 3012 wrote to memory of 3044 3012 2870998c5e9b853907fad77b6898533f.exe 28 PID 3012 wrote to memory of 3044 3012 2870998c5e9b853907fad77b6898533f.exe 28 PID 3012 wrote to memory of 2964 3012 2870998c5e9b853907fad77b6898533f.exe 30 PID 3012 wrote to memory of 2964 3012 2870998c5e9b853907fad77b6898533f.exe 30 PID 3012 wrote to memory of 2964 3012 2870998c5e9b853907fad77b6898533f.exe 30 PID 3012 wrote to memory of 2964 3012 2870998c5e9b853907fad77b6898533f.exe 30 PID 3012 wrote to memory of 2800 3012 2870998c5e9b853907fad77b6898533f.exe 31 PID 3012 wrote to memory of 2800 3012 2870998c5e9b853907fad77b6898533f.exe 31 PID 3012 wrote to memory of 2800 3012 2870998c5e9b853907fad77b6898533f.exe 31 PID 3012 wrote to memory of 2800 3012 2870998c5e9b853907fad77b6898533f.exe 31 PID 2964 wrote to memory of 2892 2964 7D57AD13E21.exe 35 PID 2964 wrote to memory of 2892 2964 7D57AD13E21.exe 35 PID 2964 wrote to memory of 2892 2964 7D57AD13E21.exe 35 PID 2964 wrote to memory of 2892 2964 7D57AD13E21.exe 35 PID 2964 wrote to memory of 2892 2964 7D57AD13E21.exe 35 PID 2964 wrote to memory of 2892 2964 7D57AD13E21.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2870998c5e9b853907fad77b6898533f.exe"C:\Users\Admin\AppData\Local\Temp\2870998c5e9b853907fad77b6898533f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:3044
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD54acfef212711e82c8a10bb8e806b78ec
SHA19f8edfb30044affd663ec5bf4309e3f529d42bed
SHA256af6bfebf0fdb9ccc12829550500831a58c7fc7130b3dbdf1a910b1b0d5215e77
SHA512a93670d837b3eb00cfd1fdc4d2508247a0203072ad3a3e6d3264f3653c3a71f36e2b743ab89331e7f6a247708baa181e555dac0ec9080988885498a1a591ac0c
-
Filesize
8.9MB
MD51c92a4a9f1eb6907949d377efb403efd
SHA1c6e7defff5f1f33d3abb62ed80e8551ed2b1a1fd
SHA256881e155817d3022b0e67f9296859c1fa228425b54260f6f299146e8359f0613d
SHA5128dc9bdb6aa55db0ba7f5d2b35381b28987738e226c43f808e985b886e5ded78d0648127556772b7a7e9167cfc24a70e9b4a8bcb7ba86f68718cab6ed6fe8d3de
-
Filesize
15.9MB
MD5de9e7c63c1216b3d27d9fcb13d42ed47
SHA16ab03be9e1b376a54cfaa15f865bc2151f00383f
SHA256767b7a5bac100f9f3b5d7449b9dcfd1a6a275e1a7fa049d86ba006d06c92da69
SHA5129fb95f3fd394581248f1eac43a520bb5f4a4195639ca51bccb14d797405e57d7ef609d8334b2be810e199eebae046ff6896e936cff41316d033cfbbe01a1625e
-
Filesize
10.2MB
MD5fa17c964d48326b36dc4e7a46c334b74
SHA1982887da760a898abdd1800043cbcfa8c7b5865a
SHA256f81e056d65d5dccc5ccfceacdcadb89e4aadf25f435e577ad7d69f85d558b17d
SHA5129ed9125c214f0e24a4789c8828738024432100397046fcf617de770263b51f6861da8c0da730a7324bcd7538c2c2620a965fd283f232b609eeeb0d29dd5cf0e3
-
Filesize
8.8MB
MD5511536a7de27dfda406ff5f34e133639
SHA10d87280daf6241777fc6dfcb6d5b0d2af5c6b44e
SHA2569d82f3c7ebbc57d3d9847a2afdcb8289c0446bb8c3d57baf540204471d8f4d71
SHA512a21790ecf1603704a5b4c74c38d07358e547290cd5168384b78a9ac792d5b7bb27993c00bf1db1fd5f1fb6738f99428e79fa782d19e05a55f96d1aae47f3ecde
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad