Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
02115e6f71b84f3600f81e9b9146ac81.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
02115e6f71b84f3600f81e9b9146ac81.exe
Resource
win10v2004-20231215-en
General
-
Target
02115e6f71b84f3600f81e9b9146ac81.exe
-
Size
1.1MB
-
MD5
02115e6f71b84f3600f81e9b9146ac81
-
SHA1
41401c70c7291f33c32dd05e2818dad3d53ad69c
-
SHA256
110cab0e31181bfafa4e745bbf0d626bed64b21e2cc0cc2bcab809baaac72da0
-
SHA512
1a90e94d54d6263d43a9c220a17136c281cf1361ca2f6d2144c69804abf93514c2e2141e6f9d0238f5384da67503089d8a0750fb3ecf747de8a638d154dc72f9
-
SSDEEP
24576:rWvknOMEdvOINaDjMdGQwMoKPlYQxMyH2FkPqGYJ8xLdOCK:rUeOMcWINauGWoKtBH4kP+imCK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2624 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2356 02115e6f71b84f3600f81e9b9146ac81.exe 2624 Setup.exe 2624 Setup.exe 2624 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2624 2356 02115e6f71b84f3600f81e9b9146ac81.exe 28 PID 2356 wrote to memory of 2624 2356 02115e6f71b84f3600f81e9b9146ac81.exe 28 PID 2356 wrote to memory of 2624 2356 02115e6f71b84f3600f81e9b9146ac81.exe 28 PID 2356 wrote to memory of 2624 2356 02115e6f71b84f3600f81e9b9146ac81.exe 28 PID 2356 wrote to memory of 2624 2356 02115e6f71b84f3600f81e9b9146ac81.exe 28 PID 2356 wrote to memory of 2624 2356 02115e6f71b84f3600f81e9b9146ac81.exe 28 PID 2356 wrote to memory of 2624 2356 02115e6f71b84f3600f81e9b9146ac81.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\02115e6f71b84f3600f81e9b9146ac81.exe"C:\Users\Admin\AppData\Local\Temp\02115e6f71b84f3600f81e9b9146ac81.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\a2YqRd4sAF\4n6uXCFk\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2YqRd4sAF\4n6uXCFk\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5fa75069564a4cda676f4135644bccc4e
SHA111210f2c7c9bb694be9a58a925bb134afe9918d5
SHA256c02e9add70966245d8290deb03fba066bcb7f62c87e2c75ed2b5d7160c71e698
SHA512ac9d4a993bfd5f28ceadb57ed68b5eb45dacc44a5f06ff30c9fbbf0bb34e30efef95eee41c369ccd2fde25f0c825208bc8757ea600a7ad858d6813320ca72f6e
-
Filesize
14KB
MD5652636a503bd3ad52c42eeb5dfed1c9f
SHA11b70e0bd7134cd6ae7a3513e3fae7df768e60ade
SHA2564c6e15b1371827e626a9af4f4d7d65c957da903eef3cee74a9e149e573125d44
SHA5127df0994f7bc6895ede38fcb49908ee7cb5d32535c2acf363efdadf771d45e4c6e29683480d342e99e5c5a38229f7543f8daa8a9a596ac86b33b90e0dd8a2287d
-
Filesize
125KB
MD501d973a0291e7fd7fe2777b846f16054
SHA18176d15b2062b5dd9159bee400fa9faf271286cc
SHA2567dfd4626777371a9caf16c99e52be96a8702acd8a90d38203d2962ed06affe62
SHA512a91133a28ba1be4d7777861446eed76de817526c2771de2b57ef94cfc4ce9d1ab3e62a94c5336eb67dc57bce9beb499c61dd97b21aef2536c72300e02bf67308
-
Filesize
70KB
MD53fb03505a031f0c3d0b9fc7a3cdd7a1f
SHA1c02d79e9b8f47022976d295a30c64f533ddac875
SHA2569e2b4460b325a8897869b5c26f387cf99cb57cd4e304edd02e8f181ed49c795f
SHA512cc3e9afa7e0409910496f7c3c1af2254f5712e630c9a7e4281fedf5f78ceab27cc3fae59029b5aff7168657c71853e375b1f1bd23f08ba5c1d4a7f87e748afc5