Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 05:46
Static task
static1
Behavioral task
behavioral1
Sample
09224c6cfb4597de0ebb0ee555c61083.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
09224c6cfb4597de0ebb0ee555c61083.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
09224c6cfb4597de0ebb0ee555c61083.exe
-
Size
1.1MB
-
MD5
09224c6cfb4597de0ebb0ee555c61083
-
SHA1
3178767aaabe7f32508ca5d7b10229f62e51d2b4
-
SHA256
224549013aee4fc5c7d8d2c1aa25bc878dbe538b20f799f47246796b2f468af7
-
SHA512
41da3d71f781e6bb1caf53a11d6dbb62564369f83e03b7af0134465b639452534cd0f38ca141bee556dd3d77d2e1d7aa379bd12dda4ea2d0f509eed1ea9f9df4
-
SSDEEP
24576:6WvknOMEf5Aquj8w/tGerLUZcjUdqh1on5K7YMcDMeHxZCg+k:6UeOMmuhlgeUyY5VMcDtcg+k
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3048 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2088 09224c6cfb4597de0ebb0ee555c61083.exe 3048 Setup.exe 3048 Setup.exe 3048 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3048 2088 09224c6cfb4597de0ebb0ee555c61083.exe 27 PID 2088 wrote to memory of 3048 2088 09224c6cfb4597de0ebb0ee555c61083.exe 27 PID 2088 wrote to memory of 3048 2088 09224c6cfb4597de0ebb0ee555c61083.exe 27 PID 2088 wrote to memory of 3048 2088 09224c6cfb4597de0ebb0ee555c61083.exe 27 PID 2088 wrote to memory of 3048 2088 09224c6cfb4597de0ebb0ee555c61083.exe 27 PID 2088 wrote to memory of 3048 2088 09224c6cfb4597de0ebb0ee555c61083.exe 27 PID 2088 wrote to memory of 3048 2088 09224c6cfb4597de0ebb0ee555c61083.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\09224c6cfb4597de0ebb0ee555c61083.exe"C:\Users\Admin\AppData\Local\Temp\09224c6cfb4597de0ebb0ee555c61083.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\a2te2QogqH\gocdVwsQ\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2te2QogqH\gocdVwsQ\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:3048
-