Analysis
-
max time kernel
253s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
15b4720ea2d529fcb6c602fc095d8fe8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15b4720ea2d529fcb6c602fc095d8fe8.exe
Resource
win10v2004-20231215-en
General
-
Target
15b4720ea2d529fcb6c602fc095d8fe8.exe
-
Size
31KB
-
MD5
15b4720ea2d529fcb6c602fc095d8fe8
-
SHA1
cdd06854b64f775f58ae78e813de4938b776b0dd
-
SHA256
c251a0e7178fd23897921382e528bcb7e477888901f2d3e9d66584e827e3efa1
-
SHA512
12af4a59ea5c136e0ee8514f7cf345d4a797082420527778188518e63b9d11f9329293dfdbc4ca77070f5e7172a667db1ab4993eed20dbaed7259585a3ea7bd0
-
SSDEEP
768:39j3dfwZCyv5uGDVWl8zHPHXyXHCzcHHvzQBdi9vc:39CCE7VWl4vUv4Wvc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 15b4720ea2d529fcb6c602fc095d8fe8.exe -
Executes dropped EXE 1 IoCs
pid Process 340 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 15b4720ea2d529fcb6c602fc095d8fe8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 340 Admin.exe 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 340 Admin.exe 340 Admin.exe 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe 340 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 340 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 340 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 27 PID 2748 wrote to memory of 340 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 27 PID 2748 wrote to memory of 340 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 27 PID 2748 wrote to memory of 340 2748 15b4720ea2d529fcb6c602fc095d8fe8.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\15b4720ea2d529fcb6c602fc095d8fe8.exe"C:\Users\Admin\AppData\Local\Temp\15b4720ea2d529fcb6c602fc095d8fe8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD552e02a342961a717d160536a238ce39e
SHA1b91d272990f368e9e7d41c43238bfa12fb938602
SHA256636995649c3c506a26f284c914fe3755946a2cbead88103a50bd3bb6ad76e096
SHA51266accfa74cd63a68dfc442ff18f643d757947773e3afa32750689f34c52ba1a9904817afa9d562ec6a0be9dffdaaf1210a262097a97ab936de9ca7203a411263