Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 05:46
Static task
static1
Behavioral task
behavioral1
Sample
09224c6cfb4597de0ebb0ee555c61083.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09224c6cfb4597de0ebb0ee555c61083.exe
Resource
win10v2004-20231215-en
General
-
Target
09224c6cfb4597de0ebb0ee555c61083.exe
-
Size
1.1MB
-
MD5
09224c6cfb4597de0ebb0ee555c61083
-
SHA1
3178767aaabe7f32508ca5d7b10229f62e51d2b4
-
SHA256
224549013aee4fc5c7d8d2c1aa25bc878dbe538b20f799f47246796b2f468af7
-
SHA512
41da3d71f781e6bb1caf53a11d6dbb62564369f83e03b7af0134465b639452534cd0f38ca141bee556dd3d77d2e1d7aa379bd12dda4ea2d0f509eed1ea9f9df4
-
SSDEEP
24576:6WvknOMEf5Aquj8w/tGerLUZcjUdqh1on5K7YMcDMeHxZCg+k:6UeOMmuhlgeUyY5VMcDtcg+k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5076 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3832 wrote to memory of 5076 3832 09224c6cfb4597de0ebb0ee555c61083.exe 90 PID 3832 wrote to memory of 5076 3832 09224c6cfb4597de0ebb0ee555c61083.exe 90 PID 3832 wrote to memory of 5076 3832 09224c6cfb4597de0ebb0ee555c61083.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\09224c6cfb4597de0ebb0ee555c61083.exe"C:\Users\Admin\AppData\Local\Temp\09224c6cfb4597de0ebb0ee555c61083.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\a2poOgpPi9\o2FASknF\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2poOgpPi9\o2FASknF\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:5076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD56e32cb7a6f42011ea6798aee8149c50d
SHA1c73e76877b8b4b9cd4294aa6881962066d337db3
SHA256a8aaba8d4c7c813a680617fe1d1de423d0b8e3d2c89b7b0751c4f5d28ea9c555
SHA5124729c9f3fd022bd1d755a48c43b2e57a722ae3bda7f3e3384583bfa15f90842decb89aef4a77c31e643b0a136d1df03ca8f8855d959ccfd9d475c68300525b63
-
Filesize
85KB
MD58a0517cec2b7e597463a4bc3fb8222fd
SHA1cab396e8e59ffbb3b60f8b87edb1e75226f61af8
SHA256965663433816855042c36dae2daa0f530caefbb041d4037a4f85f94a673ae68f
SHA512578f2cbbbdeb509cace8b092713f3a1e033dba8b392791bb628ad6fde0d74dc6f3361983f9c9635bda5f8dbe2c48337928226ca9ffa0ba8de474da7a73cb74aa