Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 14:17
Static task
static1
Behavioral task
behavioral1
Sample
003b61d05eebc7834f7ea85e40ff1fa6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
003b61d05eebc7834f7ea85e40ff1fa6.exe
Resource
win10v2004-20231222-en
General
-
Target
003b61d05eebc7834f7ea85e40ff1fa6.exe
-
Size
1.1MB
-
MD5
003b61d05eebc7834f7ea85e40ff1fa6
-
SHA1
641baa512a57f1b2eb11ccc1f98633dfc374681d
-
SHA256
227c5418a821ff60d162812eb5707477f4867e72131bdbad574b781b551d1c22
-
SHA512
c254a589c163e7bd4adae445996d093523226ff64235577a3650bc8bdb1e3f956a9bfef0c831958af549688b090a373be0e26f9f714ab3beda763e39523ba4f0
-
SSDEEP
24576:KWvknOMEfDBx0S/PM5vKxmlo3St0NaOr4q47k5j4x6CQZeC7A/IzBA:KUeOMmNb/PM5vKmlo3O0NR347k5j8dHh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 640 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 640 396 003b61d05eebc7834f7ea85e40ff1fa6.exe 90 PID 396 wrote to memory of 640 396 003b61d05eebc7834f7ea85e40ff1fa6.exe 90 PID 396 wrote to memory of 640 396 003b61d05eebc7834f7ea85e40ff1fa6.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\003b61d05eebc7834f7ea85e40ff1fa6.exe"C:\Users\Admin\AppData\Local\Temp\003b61d05eebc7834f7ea85e40ff1fa6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\a2tXCweXUi\SO0TrVet\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2tXCweXUi\SO0TrVet\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5e927bd6c6151df06546a5f19a10a07d8
SHA1ea2e89885f6cb0c9fafbae1d31b72a345fe97931
SHA2569c32abab2221b382d85819c693d44e297a9d5109d4b04afd413e361a43d284fe
SHA512da36431f17c13e7087230da042db33a6cd31887d20b52db6fe379ab62f9f2ea4a12032f18b5d8846e138db1eb75e7bd68586034d5ca5e27262d42d57cde48679
-
Filesize
144KB
MD5757ae61e6bc6da2a91c9de325cb6e138
SHA151765c29eb7b5f69cf885cb37930fa0d9d427a17
SHA2564a5c406baab81b1bbd582d1abd559c53e929e461d664c9710103ee90b7810737
SHA5123ef00e924322fe732a3bb1cc94b68a369f9f714027553fe9430dc7ca9d1cf15a461fd4ceaef6cd59582bf3afe6bce2ae74fee65a443f26ef9820907b5a7a804b