Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 16:24
Static task
static1
Behavioral task
behavioral1
Sample
0582ce91a380cf0d7e0839ea60962ee3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0582ce91a380cf0d7e0839ea60962ee3.exe
Resource
win10v2004-20231215-en
General
-
Target
0582ce91a380cf0d7e0839ea60962ee3.exe
-
Size
1.1MB
-
MD5
0582ce91a380cf0d7e0839ea60962ee3
-
SHA1
7cfe8d851a990de01c3c2c300d63eb53b0668d12
-
SHA256
13ef0d3d7a9b3c0c76349d6356099668a0c199fc34a7e0a7c8d0f27a4cde8c7c
-
SHA512
964bb82c0ad53e8983986a9382716925dfeddf4a046a009fb86c9e2011b3538ee3314a3b6764aaa7eb02254899a8c3144c99eb5ecd6b126fe9da5bb4eb2705c1
-
SSDEEP
24576:AWvknOMEfgQZc5upbjBGn7J7RilaiswfE6UGRLSqHLOOg+H:AUeOMmNZcIpHAnF7RwCuddTOOg+H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3000 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2296 0582ce91a380cf0d7e0839ea60962ee3.exe 3000 Setup.exe 3000 Setup.exe 3000 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2296 wrote to memory of 3000 2296 0582ce91a380cf0d7e0839ea60962ee3.exe 18 PID 2296 wrote to memory of 3000 2296 0582ce91a380cf0d7e0839ea60962ee3.exe 18 PID 2296 wrote to memory of 3000 2296 0582ce91a380cf0d7e0839ea60962ee3.exe 18 PID 2296 wrote to memory of 3000 2296 0582ce91a380cf0d7e0839ea60962ee3.exe 18 PID 2296 wrote to memory of 3000 2296 0582ce91a380cf0d7e0839ea60962ee3.exe 18 PID 2296 wrote to memory of 3000 2296 0582ce91a380cf0d7e0839ea60962ee3.exe 18 PID 2296 wrote to memory of 3000 2296 0582ce91a380cf0d7e0839ea60962ee3.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\0582ce91a380cf0d7e0839ea60962ee3.exe"C:\Users\Admin\AppData\Local\Temp\0582ce91a380cf0d7e0839ea60962ee3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\a2iExJYcoH\mESTIgNb\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2iExJYcoH\mESTIgNb\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5c360aeb757d1c465faac61cb199d03a3
SHA1eba8dfa51e72fa3dd8e9e289eadeee4565e7dd06
SHA256f7c5f8f76678af52a7371257f6e33f14eeea134aa50012be8ed7e8cf6f2c78ac
SHA512bf88a0c36f62c70e8ea4fa102dd7bae210393a97fc03bdc88db0f774cd4e55fe6b34f67f374c36b0d72b038c2fc513b335130d1ed97949fb7e0df855a34f9176
-
Filesize
7KB
MD5a1029c933468ec0873d6a76d4da54986
SHA1299ea3a134fa3bc4f1a84ce9842848f9d4197af8
SHA25624bb588c5a8d859d05febc4c66c6c611d1eddbc39f440e299453b8b984c74439
SHA512b635dc031651e205d641b82288fb0b37e0df0b658ed5f0c070b37e2bb5ed7f26acd98d3eb6fabf80339c20df4f902af560ce2c2f2e0d93bc0f65a65b44941d0d
-
Filesize
14KB
MD572ec16e3fdeaf9e8602bd9f984d611a9
SHA121694a18f19c4c035e3d75b5d1247df369037663
SHA256ff94ad79e59a63135c30942ea98b8cc1bc749b40b9dc41197a3060e6ee6fa85f
SHA51274db8bd719bbcb9f3c1b25f75d73ecb6a3e3f3ecf324a1fb490db473a957575dcee3d0be3e71715c3191ae01bfcd61e66a3241bb6667ed79d8dae1c572e0c959
-
Filesize
4KB
MD5f4d065817a6b69d178cffe64d288780a
SHA180313d6acd0e505362ba21cda8f714ce981ab714
SHA25628dadeeceeeba16f08b23628120ab47c6d565adf72722e73e6fdbf63fff5d88d
SHA5122b560854f57f729333642565006f3a87084f404b69c91b24bc17a56dc10397bf351872edf0af8d828781cc5b6db7c18f2c4ca79e9446b25485ea04544bc5c00d
-
Filesize
1KB
MD57382991c3d3b8bbd99ec370e43d7d3a3
SHA10b6477377bf210690ce74430d03cc5a0ee244636
SHA2560b74ce25bc2359d955b6faa82722d334bff6d1043246460f932130371bb8b52e
SHA51254f1838b890744665414386399af0870672b7ce8990fa8539e9d8c06606af0da60b234f565e01339cd5439abf87ac494f96493a045ef30041be88857aea2bf89
-
Filesize
2KB
MD55b29c45ab5855ba489c601622cea4872
SHA1d9cb0538a38cd86f00670e0365bda8d7811f2bd0
SHA256d6aa0d6e9808348f169dd14c07052af3320f008c584fb1904745709bb9e2f40f
SHA5120e6e3028ec594d1668e367572631d5bc60481070b9261eac50ef6a908d5432e3797030bc40e83d7348d9f42d1875894bf2a30e912c78da7ff9854999a5f4f4a9