Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 20:43
Static task
static1
Behavioral task
behavioral1
Sample
11a644d50aa17248815b0a72f10735ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11a644d50aa17248815b0a72f10735ac.exe
Resource
win10v2004-20231215-en
General
-
Target
11a644d50aa17248815b0a72f10735ac.exe
-
Size
1.1MB
-
MD5
11a644d50aa17248815b0a72f10735ac
-
SHA1
841230968f8617219fcf55797dea8bbaae3070e0
-
SHA256
105ba4555a8487d29f4f5721a1909beee5b428f55cf674c11bb2a5699272de1c
-
SHA512
9564186935f7aae89bdddc9e2668e87f79802d19dbb3aa6496dccac54c7815f2d67621a3a3daaaaae1f6384fe4ef6f2d52bec24e4ebabea173f94d85687e3186
-
SSDEEP
24576:aWvknOMEfVcPqdU//xbdv/bfuQ9sJqy7V/+RJ2xID:aUeOMmBsxbdzsJqy7V+RcxID
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2944 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2944 2672 11a644d50aa17248815b0a72f10735ac.exe 90 PID 2672 wrote to memory of 2944 2672 11a644d50aa17248815b0a72f10735ac.exe 90 PID 2672 wrote to memory of 2944 2672 11a644d50aa17248815b0a72f10735ac.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\11a644d50aa17248815b0a72f10735ac.exe"C:\Users\Admin\AppData\Local\Temp\11a644d50aa17248815b0a72f10735ac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\a2jQiEHdmG\Jsu3uYWh\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2jQiEHdmG\Jsu3uYWh\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5b42f5ad5c8aa4d57313b55412be163e6
SHA1235bed433dfa73a69cf3fd9f84c8849be0edf3f2
SHA2563b8924d51de962c1d6c4a1dfe83c4867bdab9069ed9fe2ce4b9919c63a5dd12d
SHA512ccde8aa1d4c1915214e989d272c22e62ec7a5e961baafc32a94bf0217ba92b181a3d1ded9cf26e3c907feeb333b549ecd5d60f8bb5e44e450df43cb8c7ec46ef
-
Filesize
92KB
MD579754216eda83097305f0ba37c51eb4b
SHA1486ecb7be66bb5275ed5b6d45867e62c8dc71af9
SHA2562b171aee4248d4ffc75e7ee42a31fba10eff2ea1a71f6166804de64ca7e4b1b3
SHA512165761525548e4ed3576558b097a527d606a5a11458afabe1be52fb0485ca1e7e63cda7ed3af4d881e0d1608889298c47bad0285eb10545f1dd9f990ef31eb46