Analysis
-
max time kernel
2s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24cde42e0f25541bf820fbab58e9029e.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
24cde42e0f25541bf820fbab58e9029e.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
24cde42e0f25541bf820fbab58e9029e.exe
-
Size
159KB
-
MD5
24cde42e0f25541bf820fbab58e9029e
-
SHA1
ef635a9b100cb6de4a7c966a32c0498f571aff3b
-
SHA256
3f2d500b763b8999666a388649a263addfec1be95a629abbf1a27388423dd928
-
SHA512
cf931bcb2a32e250893570ffd5478228f779c974ced8cb15c94abd6cc77a5dbf9807f43f4cfee6214ea561a2fb5fe2cc8e0fbfb71bed075c84f4af8c55e6b694
-
SSDEEP
3072:SKeZzG7KXXZYTcARbNJHCYiBq9ufNszVOMrDoYFoNN9zWiLm+ZjSOP:pQ67KnKIARXVVOMBFoH5ZjSO
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe 1764 24cde42e0f25541bf820fbab58e9029e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1764 24cde42e0f25541bf820fbab58e9029e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2192 1764 24cde42e0f25541bf820fbab58e9029e.exe 28 PID 1764 wrote to memory of 2192 1764 24cde42e0f25541bf820fbab58e9029e.exe 28 PID 1764 wrote to memory of 2192 1764 24cde42e0f25541bf820fbab58e9029e.exe 28 PID 1764 wrote to memory of 2192 1764 24cde42e0f25541bf820fbab58e9029e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\24cde42e0f25541bf820fbab58e9029e.exe"C:\Users\Admin\AppData\Local\Temp\24cde42e0f25541bf820fbab58e9029e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=xIxBiVwDdxE&feature=player_embedded2⤵
- Modifies Internet Explorer settings
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:23⤵PID:1680
-
-