Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 15:48
Behavioral task
behavioral1
Sample
0452788af99081a1ca7e7cdb75617dc2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0452788af99081a1ca7e7cdb75617dc2.exe
Resource
win10v2004-20231215-en
General
-
Target
0452788af99081a1ca7e7cdb75617dc2.exe
-
Size
158KB
-
MD5
0452788af99081a1ca7e7cdb75617dc2
-
SHA1
54651196aa9f9ad26b8e4f17b52f29c8847a52e7
-
SHA256
5e922d96b37fe4327caa6185ab2d6ef58279190383eb4b0d3fee0b9ea6f6ce87
-
SHA512
3a1c3c644ad5e3231fde482f09d6bc7de81e176b4d6fd5a0e97e29e7ea0b277ab47e202e040a8eb96593f18af37556bc56675a18efc1907f392864e2edd50c78
-
SSDEEP
3072:eA6Ucj4OV5/wqlltLqX9JZvfZLCY3Ioub4LQnG/aKqkcyhva:eA+j4WRlltLqNPvHvutG/aKqohC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3704 Sbifya.exe -
resource yara_rule behavioral2/memory/4460-0-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/files/0x0006000000023240-7.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 0452788af99081a1ca7e7cdb75617dc2.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 0452788af99081a1ca7e7cdb75617dc2.exe File created C:\Windows\Sbifya.exe 0452788af99081a1ca7e7cdb75617dc2.exe File opened for modification C:\Windows\Sbifya.exe 0452788af99081a1ca7e7cdb75617dc2.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Sbifya.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Sbifya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Main Sbifya.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\International Sbifya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe 3704 Sbifya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3704 4460 0452788af99081a1ca7e7cdb75617dc2.exe 90 PID 4460 wrote to memory of 3704 4460 0452788af99081a1ca7e7cdb75617dc2.exe 90 PID 4460 wrote to memory of 3704 4460 0452788af99081a1ca7e7cdb75617dc2.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0452788af99081a1ca7e7cdb75617dc2.exe"C:\Users\Admin\AppData\Local\Temp\0452788af99081a1ca7e7cdb75617dc2.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\Sbifya.exeC:\Windows\Sbifya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD50452788af99081a1ca7e7cdb75617dc2
SHA154651196aa9f9ad26b8e4f17b52f29c8847a52e7
SHA2565e922d96b37fe4327caa6185ab2d6ef58279190383eb4b0d3fee0b9ea6f6ce87
SHA5123a1c3c644ad5e3231fde482f09d6bc7de81e176b4d6fd5a0e97e29e7ea0b277ab47e202e040a8eb96593f18af37556bc56675a18efc1907f392864e2edd50c78
-
Filesize
362B
MD50b2f87fcaf79fb9c98ceb946a305c3a7
SHA100cf068201b8bc76664976be0cfba30b68f1c348
SHA2563065289032f95a578210a8da61891b5da8f7bf3c1ec1b665243ede9c211c65ee
SHA512a1f51ef7df5f48b0bfee2660014e6d6ab5347117991c4a16443477f962ffbcee02ff82b5c9b1c9fac352afc1e0b26217ac2e1db9422f56653e1611e06dda1172