Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
0cc6e26d7df15fe7a6329cc7a6e779af.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cc6e26d7df15fe7a6329cc7a6e779af.exe
Resource
win10v2004-20231215-en
General
-
Target
0cc6e26d7df15fe7a6329cc7a6e779af.exe
-
Size
1.1MB
-
MD5
0cc6e26d7df15fe7a6329cc7a6e779af
-
SHA1
9133752b9a38ed91f213944142754e973320035b
-
SHA256
10556d6afa03b09ee9d29bd0f8f1974dc77a5a8ada19edef155ca454a3c6e430
-
SHA512
2042de12dd8ca65eb67045761f2041003c9da3b6d4129f67cf8208476029b3d89e2a35bc4b30454a9cec79488e690e765fdd758b9ce6f2749c0012b70c5e09f7
-
SSDEEP
24576:TWvknOMEfSwcbBxox2LJm8ezsdZu2qtoD2GpD7CcA+A:TUeOMm5mcEk8eIkwTA+A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2992 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3496 wrote to memory of 2992 3496 0cc6e26d7df15fe7a6329cc7a6e779af.exe 82 PID 3496 wrote to memory of 2992 3496 0cc6e26d7df15fe7a6329cc7a6e779af.exe 82 PID 3496 wrote to memory of 2992 3496 0cc6e26d7df15fe7a6329cc7a6e779af.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cc6e26d7df15fe7a6329cc7a6e779af.exe"C:\Users\Admin\AppData\Local\Temp\0cc6e26d7df15fe7a6329cc7a6e779af.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\a2UJZYChQW\SLadByUz\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2UJZYChQW\SLadByUz\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD54278f07f33633378c7c300c3193d8872
SHA12b3aa9211d4fa3aac786af3dee043171250aa945
SHA256b2935dc2f2373db319b9b4a66861fbd625544e0d7b2dd80de506bde647fb0df7
SHA512f9e49a5ef5960d8dab3d43a89f7e44760f88b90a867096e6ad44d58f00547e9e6b26ad839a873cc7cc64b71ff1311e9f701a3d6cac255204fefe669658ab0589
-
Filesize
82KB
MD5e44a1a3f1ddb065a4077bffe09520b79
SHA17f5bb959237810efedbbd96b909814b257fb5b8d
SHA2566a7146d9897c6343716964b8b0db6f80bee2909aad108212723bda292ed81881
SHA512415519f6a6cd95ec8d519a52893ad9e270422500555b82a077c6e52802bbe2395c085735f0146f271d706c69c13335c2d1327e3cd0698f72e921d79a50680b08