Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
0b0efd049f7ed24203f26b3a9d977691.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b0efd049f7ed24203f26b3a9d977691.exe
Resource
win10v2004-20231215-en
General
-
Target
0b0efd049f7ed24203f26b3a9d977691.exe
-
Size
1.1MB
-
MD5
0b0efd049f7ed24203f26b3a9d977691
-
SHA1
001c6178bd3ebfc49a8c7fe95df45c57c58f5522
-
SHA256
0640311ba12f3cb32419f787909fa43ad3ff9e29d228015c5292716c0afaf500
-
SHA512
8da87e76836457083ff9f732c28fe26592e4485cf8a2d79600e652106429a609f1dd7cb2f7194ed716ca7c44ea4ecc549d9995ef07fa4b13d788e8d5b7e9ff12
-
SSDEEP
24576:vWvknOMEfXZPPQxWssKJxfvmUhh8/XEPstuk3pICtje776ToHB/hkomWb:vUeOMmJPYxWssSxfv7MXEPswk1le776M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3868 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3276 wrote to memory of 3868 3276 0b0efd049f7ed24203f26b3a9d977691.exe 91 PID 3276 wrote to memory of 3868 3276 0b0efd049f7ed24203f26b3a9d977691.exe 91 PID 3276 wrote to memory of 3868 3276 0b0efd049f7ed24203f26b3a9d977691.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b0efd049f7ed24203f26b3a9d977691.exe"C:\Users\Admin\AppData\Local\Temp\0b0efd049f7ed24203f26b3a9d977691.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\a2sg3C6zmv\nz1CRYA1\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2sg3C6zmv\nz1CRYA1\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:3868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5c592f872dd95e993a1cfc7d4d36e2137
SHA1be3198706e0190d8956408c74ff604d4cf3a07a1
SHA256505b012a7bdc0bc514783314f4c713432932cb85c0b55ed22ba3952c913fc4f5
SHA512cb439a3bcddb435fddf5da5c0c9d1618aa481c7750d8196df3ba0c2ad53e955708ff7af07d7e3d2332d7c45202215e9737541d520ac5bac5a0a6f21032c243c6
-
Filesize
183KB
MD5890bd4f95d94c9500b59327eb966d5b7
SHA14b1bee418ed6c6ee47cb1b4aa16127bde0a08442
SHA256f005604391b86244f5e6a0d44f82e561ad7ae5cd0eae2071b5ef06c6149c5668
SHA51286d809897f17e6cc1b39bf8927eb2828fa49db72b7a9fce21df3857804fe870339a86894c3e171a3eb69e6baa58b184d0b878e4eeaf1dcd2a985da20ebe054cb