Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 14:17
Static task
static1
Behavioral task
behavioral1
Sample
003b61d05eebc7834f7ea85e40ff1fa6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
003b61d05eebc7834f7ea85e40ff1fa6.exe
Resource
win10v2004-20231222-en
General
-
Target
003b61d05eebc7834f7ea85e40ff1fa6.exe
-
Size
1.1MB
-
MD5
003b61d05eebc7834f7ea85e40ff1fa6
-
SHA1
641baa512a57f1b2eb11ccc1f98633dfc374681d
-
SHA256
227c5418a821ff60d162812eb5707477f4867e72131bdbad574b781b551d1c22
-
SHA512
c254a589c163e7bd4adae445996d093523226ff64235577a3650bc8bdb1e3f956a9bfef0c831958af549688b090a373be0e26f9f714ab3beda763e39523ba4f0
-
SSDEEP
24576:KWvknOMEfDBx0S/PM5vKxmlo3St0NaOr4q47k5j4x6CQZeC7A/IzBA:KUeOMmNb/PM5vKmlo3O0NR347k5j8dHh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2344 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2968 003b61d05eebc7834f7ea85e40ff1fa6.exe 2344 Setup.exe 2344 Setup.exe 2344 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2344 2968 003b61d05eebc7834f7ea85e40ff1fa6.exe 19 PID 2968 wrote to memory of 2344 2968 003b61d05eebc7834f7ea85e40ff1fa6.exe 19 PID 2968 wrote to memory of 2344 2968 003b61d05eebc7834f7ea85e40ff1fa6.exe 19 PID 2968 wrote to memory of 2344 2968 003b61d05eebc7834f7ea85e40ff1fa6.exe 19 PID 2968 wrote to memory of 2344 2968 003b61d05eebc7834f7ea85e40ff1fa6.exe 19 PID 2968 wrote to memory of 2344 2968 003b61d05eebc7834f7ea85e40ff1fa6.exe 19 PID 2968 wrote to memory of 2344 2968 003b61d05eebc7834f7ea85e40ff1fa6.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\003b61d05eebc7834f7ea85e40ff1fa6.exe"C:\Users\Admin\AppData\Local\Temp\003b61d05eebc7834f7ea85e40ff1fa6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\a2pxuXuSe7\NTcSfS5U\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2pxuXuSe7\NTcSfS5U\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5aa9a1066c3b4ad1fd9ffe4a4b0a6020c
SHA1ed60a24e7069a75e5c4223018debe1121763118b
SHA25628fa3c28b5d3a938a89cf03d4b882d4af8091487a7bc3368a1f1866f1af6c103
SHA5123aa3aa12aba7a3451b37829cad868623016deddf6f46d03f4152ea28537d1941d25c42d1f3bde3a0ba3ef583e4b580560c17779d27c4585fe44d112458c74b15
-
Filesize
164KB
MD545dd5b7a46d52e03b417cc20bbfb4e07
SHA138c4437ca3d3bd3fdc9c129399f87d4c8306056d
SHA256b0e3a3a664f6a2ddce5ecb2b5eaa2cbbacadbbd23474917521ec8d515a6a2ef6
SHA512cb7b8ff7a5b089311e426d546341bd9279d5b200224094706143549af411466131d95402a5d69584f4f10dcebed1cf8241244018f2f1badc041c80bf44a3373d
-
Filesize
35KB
MD52c49fa5be3c802bf54fc4b9597183f10
SHA1903fc0ddec3ce70d89bae5a0ac22f3a41d3137f2
SHA256bb6f55d3556205b4d2373b13abbac1c1a5de62fa716872cb8ce197a27d298061
SHA5128c88adb82c786e3abb69c9757d9910eefe2df554af39b1075780c93f258503d30ebf27faf171d496a0cf7a779a700bdc10513baaa83ef71b4cb9f8ee987999df
-
Filesize
173KB
MD5daa2faa655582648affebdfabb061c08
SHA1ae51a3402e01d7597c07ea05bf4c3a650f5a8e25
SHA25626b52b2f79fe00ec618e14f717761746b8758d3a046059bb7197b36803b8d3f1
SHA51209f91993c21bfe850bbb9998a3ad9daa8643d92082998fda9cd95ae1c2711b33fb97505897d862d2380af36defe328ec52a66f7caed0b94713a097e4971fe6d0
-
Filesize
92KB
MD59e5af188dcf3486fadd64f3c6407b9b0
SHA162ea7199e1f909bf4aaf02a3e1a77549dd894e29
SHA25659a5c4b169303e2c69215f965930a9ca0943f8ee1bfc6d650a72b39063700b52
SHA512a9caa4171228cfa8631a73981254cbc9cb3aab2ac4e5d8bee677c4cb3682e406874264b1508e1bccd88fb80f3f1b67122c6da6820f3d3c4abf54cd4df78cce8f
-
Filesize
198KB
MD584ad54640bfe3eda677c829d7e6194c6
SHA172bd58e34b098e78b0d3d03c5fe3c368f3087f38
SHA256319e8f740d16728fb27fbe5c541e8c53884d74eff4dc1c55bfb7dbf2ae03c862
SHA51281084ffaca1aef3601436c449f025a7da362b77c7702c93fc4065c1624ecfe5eb293779e340d7e8d23d9f06985889340e49e4be47c195f51b91631ded89c1dd0