Analysis
-
max time kernel
130s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
2fbae3d59c8c3af90baaa30cdd1cc9e8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2fbae3d59c8c3af90baaa30cdd1cc9e8.exe
Resource
win10v2004-20231215-en
General
-
Target
2fbae3d59c8c3af90baaa30cdd1cc9e8.exe
-
Size
97KB
-
MD5
2fbae3d59c8c3af90baaa30cdd1cc9e8
-
SHA1
5800b06b9d024a532aa4a44e2336eb6744762f73
-
SHA256
32ff2ebeb10a5da89ebb941604d6c783543b4430951d6ab52b0e671f1f34d10f
-
SHA512
f5f738e2a21bc745208c77bbcff6c29d06d6f3478590a75695d59b47e56d6794375a482cbee6bab279e7914c4b477cdad8a190ac26190889f3b1ee097e1475d6
-
SSDEEP
3072:9+eYMX7jf+i6JJ+2aylNK0qq/Ekqq/4Lb9XPc2+/pV:wXDi6y2/l00qvkqbLpc2c
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe -
Executes dropped EXE 1 IoCs
pid Process 1948 o.i.exe -
Loads dropped DLL 2 IoCs
pid Process 5076 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe 5076 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\mo.I 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe File created C:\Windows\SysWOW64\letAo.ICo CMD.exe File opened for modification C:\Windows\SysWOW64\letAo.ICo CMD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.esj 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.esj\ = "JSEFile" 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4272 5076 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe 93 PID 5076 wrote to memory of 4272 5076 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe 93 PID 5076 wrote to memory of 4272 5076 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe 93 PID 5076 wrote to memory of 1948 5076 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe 92 PID 5076 wrote to memory of 1948 5076 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe 92 PID 5076 wrote to memory of 1948 5076 2fbae3d59c8c3af90baaa30cdd1cc9e8.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fbae3d59c8c3af90baaa30cdd1cc9e8.exe"C:\Users\Admin\AppData\Local\Temp\2fbae3d59c8c3af90baaa30cdd1cc9e8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\o.i.exe"C:\Users\Admin\AppData\Local\Temp\o.i.exe" "C:\Users\Admin\AppData\Local\Temp\co.esj"2⤵
- Executes dropped EXE
PID:1948
-
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy C:\Windows\system32\mo.I C:\Windows\system32\letAo.ICo /Y2⤵
- Drops file in System32 directory
PID:4272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5ca12d5cb1157a358b3372399d7f755a7
SHA158526974fa83dea844acd64290e13a2bcbaf96b7
SHA2560b20b428e376bc266a1a6dbc5fc440ef2b3ef701de0dcba2da3f30aae5897163
SHA512a51143d1de5fef5de5c2c5555449341629acd3b45cffdfe54a39db987f5d01c127f0439e110de8cca5eba0103bb1b40daaf2f445914bff5d4f65efdeb12300cf
-
Filesize
6KB
MD54d9e573fe1168379555d0d55b0628d3b
SHA1cd73704040704504fc61f8a1d0427cb1b9237854
SHA2564ec84fe474f324244bfd050bb91a994ad3a7aadd9118baaed164ca5b74246409
SHA5120a87b1a42f175dbb90eeda58a785e34fc83cc3f6743c8e880dfe563ae86d2255fe5db6e980060c67b4178ab2d4220f2049af43f1b9b1312f21ef02f18b307504
-
Filesize
144KB
MD5ff00e0480075b095948000bdc66e81f0
SHA1c2326cc50a739d3bc512bb65a24d42f1cde745c9
SHA2568c767077bb410f95b1db237b31f4f6e1512c78c1f0120de3f215b501f6d1c7ea
SHA5123a38e62dcb925411bc037335e46dfdd895c12a52ac43c47ef38db42d41d8358dfc2b1081a361367911d60ec5a3350ca734cf70ad57b21d39b23cfdec35b0aced
-
Filesize
14KB
MD5468fada123f5548ac87e57bae81f6782
SHA1edb8f012c25906e6afd8bf335b495e16c440243d
SHA256091c882bb307d57f2c7c42309e7ba8740130fef8c3ed772b0bc5e5505e37034d
SHA512635ec26c88c2394dd4f2a81b9aea8f429a91adfeb37ae34e51b03f3cf8e503c123c3685938f40cea07d6146e0c7113aadbe62fa528f1f6d8b995e617fd68a4aa