Analysis
-
max time kernel
143s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
28e693b783eeb26da5394c99e18697ec.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
28e693b783eeb26da5394c99e18697ec.exe
Resource
win10v2004-20231215-en
General
-
Target
28e693b783eeb26da5394c99e18697ec.exe
-
Size
7.9MB
-
MD5
28e693b783eeb26da5394c99e18697ec
-
SHA1
d83ff1e8b42474189ffae60e0a67ff121b48401c
-
SHA256
91c46b6f80e00962af3260629ff8950c6c0dd463bd93f6c0b0adb3c08e0be5af
-
SHA512
f1ec13176f36ab53e5062b3b09481d0213e6c396539c7ce3a58d092a42f8310abd8e3106db00023ec7915a64107ee3e5f219748d1e285373a2b35837a32dcbd5
-
SSDEEP
196608:8eazg7DSmeazg7DSmeazg7DSmeazg7DSN:cg7uOg7uOg7uOg7uN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 28e693b783eeb26da5394c99e18697ec.exe -
Executes dropped EXE 3 IoCs
pid Process 2224 7D57AD13E21.exe 836 Scegli_nome_allegato.exe 1408 7D57AD13E21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2224 set thread context of 1408 2224 7D57AD13E21.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4240 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 836 Scegli_nome_allegato.exe 836 Scegli_nome_allegato.exe 836 Scegli_nome_allegato.exe 1408 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1516 wrote to memory of 4240 1516 28e693b783eeb26da5394c99e18697ec.exe 94 PID 1516 wrote to memory of 4240 1516 28e693b783eeb26da5394c99e18697ec.exe 94 PID 1516 wrote to memory of 4240 1516 28e693b783eeb26da5394c99e18697ec.exe 94 PID 1516 wrote to memory of 2224 1516 28e693b783eeb26da5394c99e18697ec.exe 96 PID 1516 wrote to memory of 2224 1516 28e693b783eeb26da5394c99e18697ec.exe 96 PID 1516 wrote to memory of 2224 1516 28e693b783eeb26da5394c99e18697ec.exe 96 PID 1516 wrote to memory of 836 1516 28e693b783eeb26da5394c99e18697ec.exe 97 PID 1516 wrote to memory of 836 1516 28e693b783eeb26da5394c99e18697ec.exe 97 PID 1516 wrote to memory of 836 1516 28e693b783eeb26da5394c99e18697ec.exe 97 PID 2224 wrote to memory of 1408 2224 7D57AD13E21.exe 100 PID 2224 wrote to memory of 1408 2224 7D57AD13E21.exe 100 PID 2224 wrote to memory of 1408 2224 7D57AD13E21.exe 100 PID 2224 wrote to memory of 1408 2224 7D57AD13E21.exe 100 PID 2224 wrote to memory of 1408 2224 7D57AD13E21.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\28e693b783eeb26da5394c99e18697ec.exe"C:\Users\Admin\AppData\Local\Temp\28e693b783eeb26da5394c99e18697ec.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:4240
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5853c46b26edab03b8aac0c7d767c0409
SHA1fcb9928d4ec002cdfd9909d56ef17e20a3c68f8d
SHA25656962efe94e5466fa5a4275f48c672afe9659b6647f5477affb1cfc1448ed98a
SHA5126d32833644386616e1d70438bceb839a954202d2d1bad27284c0cf1857dd3d4b17b9bc08ea55f54d859a7f6af6ab5c255737a9c703b40e4a72375a171c3d64b3
-
Filesize
7.9MB
MD55bf6d6eaef475c7f54f219729693e6a3
SHA14c77bc333c87aa9e5a8373ed99e705bff32e36b3
SHA2565b76b28f078127abf5311c8e3ae91e53b27b5208780b15bc96c2b95e289d8573
SHA5123b9d31c7936d592598e56d2b14fc0279dfd8749c7bbef3d37b457ce9e336aa55f78e3df470457b63f83a9ec4f4e07a29d637c9573ecc54edbfd4a034f6bd0041
-
Filesize
3.3MB
MD50bfa6ba50b4e1a37e1d1453c133484d2
SHA1ec83fa63b38e0319553b09167d31522deb726eb4
SHA256191e3beff311aacad2111bb09e0f53d66f2cf8d0b1eb3f23b7d78bf1c2065aef
SHA512f6d8672399488ee7e3a758c698ff18160d7303260c6762de7f4f01bdd1c512fd7ae9d64e92cf0697d9c65a1dc61c93a0ee0fd92447e6d7770c5690996f194cd5
-
Filesize
2.0MB
MD54775c39b4cf7e01cd2da1893ed9b9524
SHA10a30ba1e6dda59acc91096b8862e728f1f5181a8
SHA256079fcb2c4fdf8ed8126f9a2accd0a15b42c9b768decba5213ec4d08d920b1592
SHA51205005b5be28c1feb74ec8fc2bd4393abee89726cbf1769ee235c092790b5eab8316918148898e7c2cf59cc6794c0696cdbe113f32e25e4fd8f6f58249a341e86
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad