Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
fd4f8865548c91fcd903a49d428079e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fd4f8865548c91fcd903a49d428079e7.exe
Resource
win10v2004-20231215-en
General
-
Target
fd4f8865548c91fcd903a49d428079e7.exe
-
Size
21.6MB
-
MD5
fd4f8865548c91fcd903a49d428079e7
-
SHA1
18d6bfe71ada5931fc9173f0a2cb96f09e3c19ec
-
SHA256
8c8a444804754ab382e45a64042cd2da8a27f89d6d46dc2a40b81461676fd6ab
-
SHA512
4d10c2a37d84be23d9b5b701029e904a8b1ed5103ad24d6a2b1eb024769df7bd9a976ce399c226f35ca2422c28dcd4885c08938d54d337ccd320e94d26033987
-
SSDEEP
98304:EcKHzs24Wvzs14WvzNnzs24WYvzs14WvzOnzs24WYvq:E9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2540 khneu.exe -
Loads dropped DLL 2 IoCs
pid Process 2004 fd4f8865548c91fcd903a49d428079e7.exe 2004 fd4f8865548c91fcd903a49d428079e7.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main khneu.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 khneu.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2540 khneu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 khneu.exe 2540 khneu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2540 2004 fd4f8865548c91fcd903a49d428079e7.exe 28 PID 2004 wrote to memory of 2540 2004 fd4f8865548c91fcd903a49d428079e7.exe 28 PID 2004 wrote to memory of 2540 2004 fd4f8865548c91fcd903a49d428079e7.exe 28 PID 2004 wrote to memory of 2540 2004 fd4f8865548c91fcd903a49d428079e7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd4f8865548c91fcd903a49d428079e7.exe"C:\Users\Admin\AppData\Local\Temp\fd4f8865548c91fcd903a49d428079e7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\khneu.exeC:\Users\Admin\AppData\Local\Temp\khneu.exe -run C:\Users\Admin\AppData\Local\Temp\fd4f8865548c91fcd903a49d428079e7.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD567c510b49889aca14c5fbfbd0aaf86f5
SHA1f9572cfedc692f829f32793918e5ca5aa801bba4
SHA2567699e8d27cfb63ec7ba4b126ee013ffc9f82dc8356dc6f5d997bc0f5b1770f3d
SHA512d45f9b03bd4c3fccbf3e20745208fbb0da28b1b175b4d786b4edbf88a54dece0281f07dc29555a893dc9ba249a121333d8c8281e70c63358f089b5712c1281d2
-
Filesize
123KB
MD5bd216fffdacf6bcee7a2af0e83a87eb6
SHA1b360e568b2aaf25238693b812e7f858ed6e3baf5
SHA256a04a2eb7ce30a560e0a3afb280664c336f3fc2c8ec8f021081aacf377ff9a030
SHA5124040ca8cf00d09a4ddd29d5a9cc4f027551e1cfbf655770803a30ae85a9740a9c8d32965eb8e8cf9a0b54ac658ba00ced82c4ff047e5737fa30f65c458425be8
-
Filesize
132KB
MD5e229e72339928fdbd379ca9fde2ba492
SHA168e0eb6f16e8feefc1d08151fd0176dcded8553c
SHA2568867264f17a73f25b152c2d5552340f92944d94a49dd50dd833b78c33ce4acc4
SHA512af0a9bd67034d279b5e2d9f5a766d5009c2ca61522c44d26a7e345b5b65911b9df79e6acdc51d0eebf4a69f758aedc288260cdab8d07af67bb61d29fefd7c0ed
-
Filesize
219KB
MD5be441980be9a497cd85f14321ebf5935
SHA1472832fa04bd8e60a11a77387216ff4bee03d76e
SHA25697abdf59299267192cb490534edd169872c566ccd6e00a722100d3b5b2b1bd80
SHA5121ebf14802d7982e48300f47b117c7b479be4b9cd01c4e171b68e62e7ed92659f7199855cdbf1499d5c042ecf33fa5efc7af2845321882ff2bbab02da4796b26a
-
Filesize
194KB
MD5e9644e6f3150af1e94dc8dc3174902a3
SHA130bbe75c410fc6092e6eeab3a77c6cadf8e0edfb
SHA256a9cd77f361f6c1e339c74f8040fd8acfc234ee31a21da6d03bba93f8d8293484
SHA5122ea624656ca5e136db48d67ef0f48cfa5349cab516695ad9e965623d57f0937f2cc3f094f554cb5ec995cfe68bb12b41439478fdda9143d1dba1df5aee342065