Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
0583f2193494cf535830cd6637c9b9ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0583f2193494cf535830cd6637c9b9ba.exe
Resource
win10v2004-20231222-en
General
-
Target
0583f2193494cf535830cd6637c9b9ba.exe
-
Size
324KB
-
MD5
0583f2193494cf535830cd6637c9b9ba
-
SHA1
7b2f007ad2eb2b607ae29d549068a88a2e5b0a0a
-
SHA256
e53b9c2da6150a262bfd63af2876d30dd6e035c4f6b98609b2ac663d90594951
-
SHA512
26ae2f2c69035cdc22aa48fadaa7a3f102d4e6c1f2911a9480ffcffb6cab5d90e26f1a364b547c38aeb8a9126c1c4f55f8689fa4954c757d2fa4eeb9eeeb66d3
-
SSDEEP
1536:YOJVn4JLlfLJ0UYFqeXx5774wN5eCD8SlNDSSvHFRiCCVGCWPaeSe+eooOoaoCom:7V4JLlfLIl774wN5eI4V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1900 Del4135.tmp -
Executes dropped EXE 1 IoCs
pid Process 1900 Del4135.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\3323.vbs 0583f2193494cf535830cd6637c9b9ba.exe File created C:\WINDOWS\3323.vbs Del4135.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "hao.thehh.info" 0583f2193494cf535830cd6637c9b9ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "hao.thehh.info" Del4135.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2132 2316 0583f2193494cf535830cd6637c9b9ba.exe 28 PID 2316 wrote to memory of 2132 2316 0583f2193494cf535830cd6637c9b9ba.exe 28 PID 2316 wrote to memory of 2132 2316 0583f2193494cf535830cd6637c9b9ba.exe 28 PID 2316 wrote to memory of 2132 2316 0583f2193494cf535830cd6637c9b9ba.exe 28 PID 2316 wrote to memory of 1900 2316 0583f2193494cf535830cd6637c9b9ba.exe 29 PID 2316 wrote to memory of 1900 2316 0583f2193494cf535830cd6637c9b9ba.exe 29 PID 2316 wrote to memory of 1900 2316 0583f2193494cf535830cd6637c9b9ba.exe 29 PID 2316 wrote to memory of 1900 2316 0583f2193494cf535830cd6637c9b9ba.exe 29 PID 1900 wrote to memory of 1952 1900 Del4135.tmp 30 PID 1900 wrote to memory of 1952 1900 Del4135.tmp 30 PID 1900 wrote to memory of 1952 1900 Del4135.tmp 30 PID 1900 wrote to memory of 1952 1900 Del4135.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0583f2193494cf535830cd6637c9b9ba.exe"C:\Users\Admin\AppData\Local\Temp\0583f2193494cf535830cd6637c9b9ba.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" /nologo C:\WINDOWS\3323.vbs2⤵PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\Del4135.tmpC:\Users\Admin\AppData\Local\Temp\Del4135.tmp 300 "C:\Users\Admin\AppData\Local\Temp\0583f2193494cf535830cd6637c9b9ba.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" /nologo C:\WINDOWS\3323.vbs3⤵PID:1952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD50583f2193494cf535830cd6637c9b9ba
SHA17b2f007ad2eb2b607ae29d549068a88a2e5b0a0a
SHA256e53b9c2da6150a262bfd63af2876d30dd6e035c4f6b98609b2ac663d90594951
SHA51226ae2f2c69035cdc22aa48fadaa7a3f102d4e6c1f2911a9480ffcffb6cab5d90e26f1a364b547c38aeb8a9126c1c4f55f8689fa4954c757d2fa4eeb9eeeb66d3
-
Filesize
266KB
MD51861b0d15a96f0eab78821ef09f11398
SHA19931aec4e49a4075ce680ae5e69069f506f4383c
SHA2560981eb96faa65fe1ea7afde1d97184d67970c06ed442919a1173b48e91ad5d54
SHA5122b49cf513a546e43040fe63f99adf1d4cd49510a65c04d68122e398c9e1687fd5b29094261cc5265d92b740e8ee9fad46994a97d32ce86222abc7669afd97415