Analysis
-
max time kernel
142s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 18:11
Static task
static1
Behavioral task
behavioral1
Sample
337b0e190043b53ec5a510bd91971785.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
337b0e190043b53ec5a510bd91971785.exe
Resource
win10v2004-20231215-en
General
-
Target
337b0e190043b53ec5a510bd91971785.exe
-
Size
1.1MB
-
MD5
337b0e190043b53ec5a510bd91971785
-
SHA1
4a27fc2a14e1f224ddd37c6a23300f0bd98bda98
-
SHA256
226545c8833b1610cb65f36b26cbcea373d0ccf92f36d1161e59ae8602892623
-
SHA512
838fe130623877e4bd1b5007dca6d7ff525cb0897945d4c6c0ab23e1139ace6786933f4c150ec8c55811a8ec09f3d6ec3e3821b711632c0e72767dc80fdcd203
-
SSDEEP
24576:nWvknOMEfFIT1Xc78ktFDDZNtN8bO/Actcl13+8VNr5v5V+9:nUeOMmvo4DDZN4i/Ac7415V+9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 376 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5100 wrote to memory of 376 5100 337b0e190043b53ec5a510bd91971785.exe 93 PID 5100 wrote to memory of 376 5100 337b0e190043b53ec5a510bd91971785.exe 93 PID 5100 wrote to memory of 376 5100 337b0e190043b53ec5a510bd91971785.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\337b0e190043b53ec5a510bd91971785.exe"C:\Users\Admin\AppData\Local\Temp\337b0e190043b53ec5a510bd91971785.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\a2C3VZ6AWF\fY5uqCQh\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2C3VZ6AWF\fY5uqCQh\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD555bc7a6e0e5d0a4ac8e2af5fa6a8fa3a
SHA1cb26ad43e5bfb26c96486085f5a584ee48f84c39
SHA25644aba48afa8a5efb5b2dd1666def2e60ed9e2dd07121a56767654e389df868bc
SHA5123193a951d9179e16e13df5114dd0baa778dd5592b44f6707f1cf4f4e53811ce9d37ee8766ecb982d390e81e00834ef7d67213b8fc0c1c1f64f89cebf16961996
-
Filesize
97KB
MD506c5a1f09c69cc1b247d18103bb38572
SHA17b3eb9ff4e19701df41b094fdfca364bdc071acd
SHA256c32defa15e3f4f26d362f81fcb451197aebafe8af0067f2509049be1f7164626
SHA512fd83bc3f7e00e5ce210b1cb41d8f50575904cc281468569ca3f35a37465088fc0f2b8f2015f0bc3af618f9dcaf6b1d367cb14e48b671ca4362c3323b6cf7a9a2