Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe
-
Size
1.1MB
-
MD5
0ae1d1bfe071ffb9c4ea27aeb0bfe8d2
-
SHA1
c825c13ee141f3cd364a382da110354d0e9c58e4
-
SHA256
1397988ea9c4c30857276777fe846c4042e5709baeef51c9678364a98d9f02d0
-
SHA512
ed5cfb74a41ebad0d55bc0aba61ec2f1620d1fe1d635506298e2d5ae0e657c9808a81f946ee11af221dfba823feaf51ba41f133763c8657ca8ead772d8921524
-
SSDEEP
24576:vvSgsm2AgadTQIidArmCL54rWILwpf0IPyUyxPyQc:npdWIiqp4iILwZyN6N
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1032-0-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-4-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-7-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-117-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-121-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-119-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-118-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-6-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-140-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-142-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-166-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-189-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-188-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-190-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-165-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-164-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-191-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-193-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-192-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-194-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-196-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-195-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-197-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-198-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-199-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-200-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-201-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-202-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-205-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-204-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-206-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-207-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-209-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-208-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-214-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-213-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-216-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-215-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-218-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-217-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-221-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-220-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-223-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-222-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-225-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-224-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-230-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-229-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-232-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-231-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-234-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-233-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-237-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-236-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx behavioral1/memory/1032-238-0x0000000001DC0000-0x0000000001F7C000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is259394281.log 0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main 0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1032 0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe 1032 0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1032 0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1032 0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe 1032 0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe"C:\Users\Admin\AppData\Local\Temp\0ae1d1bfe071ffb9c4ea27aeb0bfe8d2.exe"1⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1032