Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
0251bbb908bcefd50badfa5d8477eddd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0251bbb908bcefd50badfa5d8477eddd.exe
Resource
win10v2004-20231215-en
General
-
Target
0251bbb908bcefd50badfa5d8477eddd.exe
-
Size
1.1MB
-
MD5
0251bbb908bcefd50badfa5d8477eddd
-
SHA1
9182d009557f01db617a6ca2a5ad3f4a6e84dca7
-
SHA256
22a888abc610e20f5cc9c938846b14c74aeb331ed560fe50cf7352529f4fbb70
-
SHA512
94d51ae20b8ea92f19722bb72dbad8cf4f409cacddeb5db8934d30954d99e8f63b70ceb8cbe4e5eb52992b53df57e5ade162b11d306e9b77aecd93e48190e684
-
SSDEEP
24576:GWvknOMEfwE1xSWFrRjyMXoWp9yrWkq2sQJXzp8XKg/GOTqRy+r:GUeOMm9x7dRL4O05JX8K7OORy+r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 660 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 660 4180 0251bbb908bcefd50badfa5d8477eddd.exe 91 PID 4180 wrote to memory of 660 4180 0251bbb908bcefd50badfa5d8477eddd.exe 91 PID 4180 wrote to memory of 660 4180 0251bbb908bcefd50badfa5d8477eddd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0251bbb908bcefd50badfa5d8477eddd.exe"C:\Users\Admin\AppData\Local\Temp\0251bbb908bcefd50badfa5d8477eddd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\a27MUjG6wv\JtNr8GSz\Setup.exeC:\Users\Admin\AppData\Local\Temp\a27MUjG6wv\JtNr8GSz\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5afe600f66c7ecfb6bc01170fbc7fcba8
SHA1006b5af1518b1b8dae8eacdf19e30f9feb332063
SHA2568a48d3a75b4f31fe37fb9460473260be23bee3d1bb3e8c654b2d1aebb03f39d1
SHA512939d71b43124daf01c4271afab7bf8c04712f54263053fb7bdab304daf3c16cb8c3f02e2f1c3a2e664ad1150f3fde347e2a7fe66f46b58cf5de5ee2012b402de
-
Filesize
153KB
MD5c74284f6af7b629d6bd408d9ee23a26a
SHA169ac2811e9a43272513eb8cf91e33835151d144e
SHA256753f32f6062341fc9066221fb3956da0825e82b7a7130fbefb3db8b27e71f205
SHA512b2e99472fa7479e81d0cb9e0a8a6c974da9abb3b3852aa2aa42bb533e2cf983b5ec3da0af448ce2f384d8b23f270452a3660fd634e4125fb0c6a7ed4dfae5c78