Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
d530e05498a9db069de0b83dc301cd10.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d530e05498a9db069de0b83dc301cd10.exe
Resource
win10v2004-20231215-en
General
-
Target
d530e05498a9db069de0b83dc301cd10.exe
-
Size
8.6MB
-
MD5
d530e05498a9db069de0b83dc301cd10
-
SHA1
a3731dd0e278f5b8b8658c9a217a0e094516e84b
-
SHA256
8dada117e4a25836d2251d1c55efaf3d5394c94865ba37442866ba1b290e060d
-
SHA512
1ee57ee7fd4542f542ba3925b5d3df62785746d4a6b8c048dab73cc91129be7531eaa42c89d5432772457a86a8d019539c653218c6c3dbc4542d60e318a960db
-
SSDEEP
49152:EQFRHrmQG+yrV2fdxZrmQG+yrV2fd6QG+yrV2fdxZrmQG+yr5fdxTrmQG+yrV2fX:EcKVXVUXg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2672 vsiaz.exe -
Loads dropped DLL 2 IoCs
pid Process 2548 d530e05498a9db069de0b83dc301cd10.exe 2548 d530e05498a9db069de0b83dc301cd10.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main vsiaz.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 vsiaz.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2672 vsiaz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2672 vsiaz.exe 2672 vsiaz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2672 2548 d530e05498a9db069de0b83dc301cd10.exe 23 PID 2548 wrote to memory of 2672 2548 d530e05498a9db069de0b83dc301cd10.exe 23 PID 2548 wrote to memory of 2672 2548 d530e05498a9db069de0b83dc301cd10.exe 23 PID 2548 wrote to memory of 2672 2548 d530e05498a9db069de0b83dc301cd10.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\d530e05498a9db069de0b83dc301cd10.exe"C:\Users\Admin\AppData\Local\Temp\d530e05498a9db069de0b83dc301cd10.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\vsiaz.exeC:\Users\Admin\AppData\Local\Temp\vsiaz.exe -run C:\Users\Admin\AppData\Local\Temp\d530e05498a9db069de0b83dc301cd10.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD53c7f849571b57dbab2a02f27a946ed9d
SHA1850c585fc9f373d306bb3e4b80f18f1642e5ba84
SHA256c33d63462d5c80680feb49b43ce7274407f96a1ff7f76d4e84970dd6421d9e75
SHA512f28829945075252b72a807d09f1b743b526b95c79ec010012965e283345cbf2259c659de719c0ec66f7e94a78eb5eb534936f27125063cf44c63bc5c4951b1a0
-
Filesize
217KB
MD5b459b8dd88fe6627b6f98776cb819628
SHA11a1b83f1ed52634806f90e025faa6a679f325f40
SHA2569bbdc44c7c49ab7458a4b5cb690dd63e6a5d351741f13e7370e14ff0bf92bcbb
SHA512664c390fcaf97bff7c1ffa2ee820512472ca6a41818076f940547c230d053e770660b369f1500ea4fd541136b4c8155aa60881919451a5f129d1c8465f9ce790
-
Filesize
96KB
MD527485141896b60938889bb7413d53ae1
SHA19692d7d3ee118312e83456a0ca39e1481efa7ec1
SHA256a57dbf1d2862cfa87ea5494e2e9ac7b87f96a1c38395a36072c2c3e65121b431
SHA51298efd277894f38951845715b4b53f3097bb5d398061b07bd27c2e0513266b4fca19cb615387567559d6571be4219fb7ef52aec981ec5d8f55b779d0e6c0301b9
-
Filesize
225KB
MD591184fb70f4b3319b9a516b4a171ed7a
SHA179573871478a94ddb5ed68a37b616a3b19f676a2
SHA256ee348f213a131b3ef6d59a21a4f8bde96049d7e33e2cc8560498d918751e38ff
SHA5125e10f026de5a17b4a42712925e12a24186d7b32ab0a427f3d3e7dba8d12b9f997c6283a61cef9067832af0384b4ae844323601d5a32c327a99b5b89174754c35
-
Filesize
165KB
MD5652baf9220870669e1983191b5f2cf38
SHA177a8e07d7d9b81fc05f98f64d33a976f283ab791
SHA2567869bf73c65876c24df353745dcb4f072b38e7331b0ffc4be9825f73b8e600fd
SHA51243334f3fd67bb63f32bcb70c58e65f6de3a33672065e40e7fa5d47b528d079d05bc8c0b4caff97dbbf40a0dab7e6b553e1c411add95760a26b1a6c6888d33563