Analysis
-
max time kernel
163s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
0b0f4774332a528d538ba8f5657b1576.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b0f4774332a528d538ba8f5657b1576.exe
Resource
win10v2004-20231215-en
General
-
Target
0b0f4774332a528d538ba8f5657b1576.exe
-
Size
324KB
-
MD5
0b0f4774332a528d538ba8f5657b1576
-
SHA1
9a084a946021ed0e11466f39d4976fc13f11a723
-
SHA256
e2ef7ae67a756af62c19532fcbcbd3de484ccec60da8b6c7543b0f7bc602c678
-
SHA512
e0b8255b94ae6c6aed523252816e26316f0d66e61d1d17ce0a4f141adbce1025cb117b96742fdc35b0d75b3cad561edf3d5562f651a2a17aac5fbeb91969f32d
-
SSDEEP
6144:d9OLCr50OaSjg6H3qBC1hJI26sQwO0yRJJ5JDVoYKQIDKT3cKamM9p6HprBIvDAy:uLCFUSj7Ha0JI7sbyRJJ5pKLKDymMgBh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2668 mEdEaAe01827.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 mEdEaAe01827.exe -
Loads dropped DLL 2 IoCs
pid Process 2980 0b0f4774332a528d538ba8f5657b1576.exe 2980 0b0f4774332a528d538ba8f5657b1576.exe -
resource yara_rule behavioral1/memory/2980-1-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral1/memory/2668-14-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral1/memory/2980-18-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral1/memory/2668-19-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral1/memory/2668-34-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral1/memory/2980-49-0x0000000000400000-0x00000000005BD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\mEdEaAe01827 = "C:\\ProgramData\\mEdEaAe01827\\mEdEaAe01827.exe" mEdEaAe01827.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main mEdEaAe01827.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2980 0b0f4774332a528d538ba8f5657b1576.exe 2980 0b0f4774332a528d538ba8f5657b1576.exe 2668 mEdEaAe01827.exe 2668 mEdEaAe01827.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2980 0b0f4774332a528d538ba8f5657b1576.exe Token: SeDebugPrivilege 2668 mEdEaAe01827.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2668 mEdEaAe01827.exe 2668 mEdEaAe01827.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2668 mEdEaAe01827.exe 2668 mEdEaAe01827.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2668 mEdEaAe01827.exe 2668 mEdEaAe01827.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2668 2980 0b0f4774332a528d538ba8f5657b1576.exe 27 PID 2980 wrote to memory of 2668 2980 0b0f4774332a528d538ba8f5657b1576.exe 27 PID 2980 wrote to memory of 2668 2980 0b0f4774332a528d538ba8f5657b1576.exe 27 PID 2980 wrote to memory of 2668 2980 0b0f4774332a528d538ba8f5657b1576.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b0f4774332a528d538ba8f5657b1576.exe"C:\Users\Admin\AppData\Local\Temp\0b0f4774332a528d538ba8f5657b1576.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\ProgramData\mEdEaAe01827\mEdEaAe01827.exe"C:\ProgramData\mEdEaAe01827\mEdEaAe01827.exe" "C:\Users\Admin\AppData\Local\Temp\0b0f4774332a528d538ba8f5657b1576.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD59b37dd22bdb4112f81365580fa6cea02
SHA1e3bb3580b51ef8ee7e614688487a98489649687c
SHA2562786cd81398d351bc561db490c9daf03888cae377d3e5a173587591fc3e999ba
SHA512d84d9a3bb4045709bce293aab4b32dbaf5ba9356bc594135a78ba7d5e3d101beb41519655dc0b2631a28389da75359f189e90d33167e444039d6c9d3515461ec
-
Filesize
181KB
MD584ea274b1eba115d307aa55411a1e956
SHA10ba5d440096f1ae5821b34aaed4b169d8e2d2455
SHA256657d2163847cc8fa6c749160ea14675e95113f2cc3e5e9ab1193eca0de8cb6e7
SHA512a11413b52c7e736c3dba3a592e4aa7d82ab2b50d5a94afce0cc158b53366b88becc7ea451d1222aa8516c831ca332185d125896056ffc83a53b1f34e295d7db4
-
Filesize
248KB
MD5ae62866e86b2088d4aa8cef732fdf0db
SHA1e686d041b34d9a7666bc616394b42a4f7447f34f
SHA2566b7f81e218857ada0f528cdf78040eea9a8007b82d16e3e9a385476a57da537b
SHA51221c832777e219fabc431e968b8532241cdc74915ba25a7424e17dd601b5cc8acf4447cc4176317aa53c02cc26d18bd552eb9e5ab993e6d6ffc73d706319f956d
-
Filesize
176KB
MD5cd9de02f0b232d1ccb5103fd32d6487f
SHA15b6b7d23b48708b66ee6f7fa822ac972b0f620de
SHA2562c125531746618138f314315659396642616d5f38769e64ea16fc03cbe701565
SHA512cb18ecb3e41ee1d30b62c5a76d00f86efdfc106d8ca11c617db4bbe4a5b73b66c2432211662047f46a18cbdc9d815c6c5ec701fbba9429145489bc895e87b2f2
-
Filesize
204KB
MD5c9f7fe0f79cd02e6ff069135415b979e
SHA19b7bd495cec8d1357a40a4ad85145db83b62b89c
SHA256b2ede0b99c9965c811936b1d03f3b09708d4b08c26460952f71c5df45e9ccb53
SHA51256e4b9a1c1337eba14326f5508d9efbe9f025289971ae7c65774cd43af1ac3e5b3219ba9d52de420ec73eb19dc4da58b3258cd3f24d4a9efe31f2d2bfd063acb