Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 17:32
Static task
static1
Behavioral task
behavioral1
Sample
311cfaf66be2e6e4dc4490f3ea441321.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
311cfaf66be2e6e4dc4490f3ea441321.exe
Resource
win10v2004-20231222-en
General
-
Target
311cfaf66be2e6e4dc4490f3ea441321.exe
-
Size
1.1MB
-
MD5
311cfaf66be2e6e4dc4490f3ea441321
-
SHA1
e15817a29b8c760a4b6e6268bce7bbd3818c4891
-
SHA256
1468493c8b2a9517830c4a3cdc48a09df45fca95d2ac3dfd138a77604ad4424e
-
SHA512
5e9ec473eb2e1c08a8bc81eba49007d2bbddaa1ab90a726544c1e89565cea52eeb60f46cabbce299d66cb88411245c550b824352f1e6567b46e73f0dd4dbf9a9
-
SSDEEP
24576:eWvknOMEfu2sthY7ugl3EwszUawtygSrXd71IrL:eUeOMm1stG7ug5Bp0g6BurL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2632 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2236 311cfaf66be2e6e4dc4490f3ea441321.exe 2632 Setup.exe 2632 Setup.exe 2632 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2632 2236 311cfaf66be2e6e4dc4490f3ea441321.exe 28 PID 2236 wrote to memory of 2632 2236 311cfaf66be2e6e4dc4490f3ea441321.exe 28 PID 2236 wrote to memory of 2632 2236 311cfaf66be2e6e4dc4490f3ea441321.exe 28 PID 2236 wrote to memory of 2632 2236 311cfaf66be2e6e4dc4490f3ea441321.exe 28 PID 2236 wrote to memory of 2632 2236 311cfaf66be2e6e4dc4490f3ea441321.exe 28 PID 2236 wrote to memory of 2632 2236 311cfaf66be2e6e4dc4490f3ea441321.exe 28 PID 2236 wrote to memory of 2632 2236 311cfaf66be2e6e4dc4490f3ea441321.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\311cfaf66be2e6e4dc4490f3ea441321.exe"C:\Users\Admin\AppData\Local\Temp\311cfaf66be2e6e4dc4490f3ea441321.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\a2k9zdGgsx\8IRgqq74\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2k9zdGgsx\8IRgqq74\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5311cfaf66be2e6e4dc4490f3ea441321
SHA1e15817a29b8c760a4b6e6268bce7bbd3818c4891
SHA2561468493c8b2a9517830c4a3cdc48a09df45fca95d2ac3dfd138a77604ad4424e
SHA5125e9ec473eb2e1c08a8bc81eba49007d2bbddaa1ab90a726544c1e89565cea52eeb60f46cabbce299d66cb88411245c550b824352f1e6567b46e73f0dd4dbf9a9