Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:27
Behavioral task
behavioral1
Sample
17290ed8118900552259cf748357f7a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17290ed8118900552259cf748357f7a6.exe
Resource
win10v2004-20231215-en
General
-
Target
17290ed8118900552259cf748357f7a6.exe
-
Size
1.1MB
-
MD5
17290ed8118900552259cf748357f7a6
-
SHA1
3e475ad976679b874797a469057f6b22f110ab1f
-
SHA256
22a75f0aed833934d964eaf26b2f81660bdd67af450e618a5f0eaa1598cd35be
-
SHA512
22c9ee4125027d5cbc9908f020a0c467be005f420b85f7c2dbf7686aa2b855a8ac449a5a12a51d45e71d536edb5da9d05705ead7244cd8d8084e546186e872d2
-
SSDEEP
24576:IdXzXT/0GC8mlTO/xmybqffaUUoQxW0zrSBknFPh/jnk:IdXzXT/EdTAxm5qUgWwe6hA
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2404-0-0x0000000000CD0000-0x0000000000F22000-memory.dmp upx behavioral1/memory/2404-20-0x0000000000CD0000-0x0000000000F22000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main 17290ed8118900552259cf748357f7a6.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 17290ed8118900552259cf748357f7a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 17290ed8118900552259cf748357f7a6.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 17290ed8118900552259cf748357f7a6.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2404 17290ed8118900552259cf748357f7a6.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe 2404 17290ed8118900552259cf748357f7a6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17290ed8118900552259cf748357f7a6.exe"C:\Users\Admin\AppData\Local\Temp\17290ed8118900552259cf748357f7a6.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD560995d04e55f8d138cf5183e95942906
SHA1d90f51dd6705b94d7d3915dad623f61a7654a410
SHA25605b3464493d500473e1370aafd8c0b8db1678bd38353237141997607caf5c132
SHA5123886ba8025d96b3ba1522def75b997aec503505c14ec3364bba93fa8a5509c792b44bc67a9afbfcc4af9047bad69ae7c9dfd61ec094079cf7ddf3838704af871