Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
00b8f96fb6ca815c124fef0c778b4dd4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00b8f96fb6ca815c124fef0c778b4dd4.exe
Resource
win10v2004-20231215-en
General
-
Target
00b8f96fb6ca815c124fef0c778b4dd4.exe
-
Size
108KB
-
MD5
00b8f96fb6ca815c124fef0c778b4dd4
-
SHA1
78b4be54c2d303330306e9b51e11d2b44bbeaf32
-
SHA256
98deca70eff4b84c033ebf240358243cea04a4379cf8c83be12f5b110421e745
-
SHA512
f4603f46891adec3189fda105301e3833e6b914067115b8520bff22c8315f107b94fa33101aa67b1e0394326ee7ec7658969f4fea019e3de227b163f4c2d1aa7
-
SSDEEP
1536:sOXzS8NVjJl5IhNtAImi8f04ZdvTKRzcYiAjW2qIJtj:suu8NVjJl4wf9ZSzhb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\windw32_twk = "C:\\Program Files\\Web Publsh\\services.exe" regedit.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Web Publsh\1.txt 00b8f96fb6ca815c124fef0c778b4dd4.exe File opened for modification C:\Program Files\Web Publsh\services.exe 00b8f96fb6ca815c124fef0c778b4dd4.exe File created C:\Program Files\Web Publsh\1.txt 00b8f96fb6ca815c124fef0c778b4dd4.exe -
Kills process with taskkill 1 IoCs
pid Process 2968 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2660 regedit.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2968 taskkill.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 1404 00b8f96fb6ca815c124fef0c778b4dd4.exe 1404 00b8f96fb6ca815c124fef0c778b4dd4.exe 1404 00b8f96fb6ca815c124fef0c778b4dd4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2968 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 28 PID 2212 wrote to memory of 2968 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 28 PID 2212 wrote to memory of 2968 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 28 PID 2212 wrote to memory of 2968 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 28 PID 2212 wrote to memory of 1404 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 30 PID 2212 wrote to memory of 1404 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 30 PID 2212 wrote to memory of 1404 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 30 PID 2212 wrote to memory of 1404 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 30 PID 2212 wrote to memory of 2660 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 32 PID 2212 wrote to memory of 2660 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 32 PID 2212 wrote to memory of 2660 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 32 PID 2212 wrote to memory of 2660 2212 00b8f96fb6ca815c124fef0c778b4dd4.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\00b8f96fb6ca815c124fef0c778b4dd4.exe"C:\Users\Admin\AppData\Local\Temp\00b8f96fb6ca815c124fef0c778b4dd4.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /im iResearchiClick.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\00b8f96fb6ca815c124fef0c778b4dd4.exeC:\Users\Admin\AppData\Local\Temp\00b8f96fb6ca815c124fef0c778b4dd4.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s C:\2.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167B
MD50d415638df65e93b0e3f62784ec1da1f
SHA1c69e99d962f1652d990bc35c3896fea216b5304f
SHA2563e174a5a380b19e487b733f9383b3b91ad894c39f089947eaefb8a4a4c22a3e1
SHA512228a61fd0e4d8deb5acf7c9e9cfdf4be29df32fee37f27c1662630a3c7ca25428216a7d08b989b1c47f864234b98f811e583f90971f2bf7de71ce96dc4d55e92