Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
2094125925eaa9718a3c23f8ba0f271f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2094125925eaa9718a3c23f8ba0f271f.exe
Resource
win10v2004-20231215-en
General
-
Target
2094125925eaa9718a3c23f8ba0f271f.exe
-
Size
1.1MB
-
MD5
2094125925eaa9718a3c23f8ba0f271f
-
SHA1
71bc9949be200624a76bbc3620b6223fb16c3c97
-
SHA256
202b45e1fbebb147bab50facb3dd6206a9d48da1a9165f1f13f91b0b4fa0243b
-
SHA512
21102248bfc6e799d397070531550caf033d0a49493efdeba351474d8e186e4151e63b9e21506b9c0c30f3478c21af46aeca59e7e66a5204c23d19ef2aaf5081
-
SSDEEP
24576:IWvknOMEfD4aBQDqIdPpFhSdTdUU7CiP//omcWOQJ:IUeOMmz1IZNSNdUU7M9E
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2588 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2200 2094125925eaa9718a3c23f8ba0f271f.exe 2588 Setup.exe 2588 Setup.exe 2588 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2588 2200 2094125925eaa9718a3c23f8ba0f271f.exe 28 PID 2200 wrote to memory of 2588 2200 2094125925eaa9718a3c23f8ba0f271f.exe 28 PID 2200 wrote to memory of 2588 2200 2094125925eaa9718a3c23f8ba0f271f.exe 28 PID 2200 wrote to memory of 2588 2200 2094125925eaa9718a3c23f8ba0f271f.exe 28 PID 2200 wrote to memory of 2588 2200 2094125925eaa9718a3c23f8ba0f271f.exe 28 PID 2200 wrote to memory of 2588 2200 2094125925eaa9718a3c23f8ba0f271f.exe 28 PID 2200 wrote to memory of 2588 2200 2094125925eaa9718a3c23f8ba0f271f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2094125925eaa9718a3c23f8ba0f271f.exe"C:\Users\Admin\AppData\Local\Temp\2094125925eaa9718a3c23f8ba0f271f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\a2syRBGl30\SW8flukj\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2syRBGl30\SW8flukj\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD5cd6fa1e3126535fb1465d4918aa63106
SHA1e566bc090898d3ff954fae3328d2b8c16839f1db
SHA25654fc72198e5d5ced6e571314b869c1cdba53d1e3e8d645db7bd09beb91aaa4c5
SHA512428b554b336f6fc6a6ac5ced6e4376c1532ea027daffe74297ee694d325ca934f781ca297e42ecb6c25fee0623dce04b82e790449471807f6240563ce7e40251
-
Filesize
456KB
MD5a949b41bd67ab696ce0823ec705cfc14
SHA1bce072ea903e350da61454d1fbfd82e60441c9a4
SHA256f3099a5285a8851480c5af8f35b9660c59cd1593a187e88af490e1ad3d1a7ef1
SHA512b9b4d94bc40d446dd2e43117287b144dd8b3c892b1e1a6a82bbc51476cab116932c366e2997b17018c9c38069b7561c72102f074c512300f66ead9de6aedbcb9
-
Filesize
604KB
MD5ab16ae2a46c914042a512e3a7fb56eab
SHA145d3a73fa36f922f11a6a9122e9b32f9e7edc7b6
SHA256ebac7e61f334df68e8ef92aa617c6e73f35aa5367a4e9172d7aa605bda2bd96a
SHA51209f25ec90c7bf2b0597b50cc439368186867b4a05544cb4e095667bf92ccafa95b83367c3dc84aa74a595ff016d3cb30f2e9b09dc1ff2e88a1efb755377be30c
-
Filesize
334KB
MD5ac72fb955a5189bf69a296373e76a9c8
SHA11eae39afd8b21cfd9ffe3ca128edbbbb0b757e08
SHA2569b1d4cc53e8f1d19873f0e2de51f00d084f9115bb382b0c7f23ebe6e1fa487e3
SHA5120bcbff74fc64030ba2c408508012619c6b26f53473fea44ee8e52803b3b38bf38d31941b7b6c4fcbb3169914886fd67026120ba41aade33d70a01a3597f9d913
-
Filesize
333KB
MD57493f0894502c2e5dbe24a0fc007f61f
SHA1d16f32c6be5598c0691705240bda1afcd359f8ae
SHA2568a361e6fab32a7a93fc77c403467cb11311f571c0a3dd9920a0eb6676ed340ff
SHA5121f91f1e7ea5bf905ecd3b22f399b73c2c87a2ad56e1b568254e3d1592147e6142ee3b535d7f669e1a35267ff0204e62a37efc7609091b2cc0a1eabe91e3f2fdb
-
Filesize
245KB
MD532b792d1cd94285150ad158504303122
SHA19d623bcf78cf9ace65335685bb493b2ea1c3650e
SHA2565a55b032616f89b243640c4b5d5a4eaba309ea2fb4068196fa611915316661f6
SHA5126310baf35637f6bf5bf1bf942a5b5b6233d159b93d378de9c9542d8c6660b09bb40ed94c72f7b9693c2aaa92d3081e932dfd717a933964fdb4c0f0b221618cc8