Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
36ef68992a056afb1eb890b1a02b1e75.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36ef68992a056afb1eb890b1a02b1e75.exe
Resource
win10v2004-20231215-en
General
-
Target
36ef68992a056afb1eb890b1a02b1e75.exe
-
Size
746KB
-
MD5
36ef68992a056afb1eb890b1a02b1e75
-
SHA1
601bec3e30fc479615161fa18eb29dc9bba5bcf6
-
SHA256
47dc2451bf9264a8b01f95ecf99e2212c7b8fa88c34b9808ac19af3adfc59132
-
SHA512
242a651550fa7f2c8682bf95b386ebb27ac6e7dad9b05796d467559a37ff557188a9b021eb374710cb93b171583ade0c60609149e0e36d7e3d2eca5139605bee
-
SSDEEP
12288:yabr6ZtoTr9JRv2HumjbMFuz1Z5VPCUnuij3s6CLHKiwqV5liv7:Lb3TrP4OmjbMIRZGUnuiLs6CLH39V5l8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2460 7D3B99B52B6.exe 2480 NLS115F.exe -
Loads dropped DLL 4 IoCs
pid Process 2988 36ef68992a056afb1eb890b1a02b1e75.exe 2988 36ef68992a056afb1eb890b1a02b1e75.exe 2460 7D3B99B52B6.exe 2460 7D3B99B52B6.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\7X3V9JVF8E8VZIZEUNHATAMBFA = "C:\\win32\\7D3B99B52B6.exe" NLS115F.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PhishingFilter NLS115F.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" NLS115F.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" NLS115F.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery NLS115F.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" NLS115F.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 36ef68992a056afb1eb890b1a02b1e75.exe 2988 36ef68992a056afb1eb890b1a02b1e75.exe 2460 7D3B99B52B6.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe 2480 NLS115F.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2988 36ef68992a056afb1eb890b1a02b1e75.exe Token: SeDebugPrivilege 2988 36ef68992a056afb1eb890b1a02b1e75.exe Token: SeDebugPrivilege 2988 36ef68992a056afb1eb890b1a02b1e75.exe Token: SeDebugPrivilege 2988 36ef68992a056afb1eb890b1a02b1e75.exe Token: SeDebugPrivilege 2460 7D3B99B52B6.exe Token: SeDebugPrivilege 2460 7D3B99B52B6.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe Token: SeDebugPrivilege 2480 NLS115F.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2460 2988 36ef68992a056afb1eb890b1a02b1e75.exe 30 PID 2988 wrote to memory of 2460 2988 36ef68992a056afb1eb890b1a02b1e75.exe 30 PID 2988 wrote to memory of 2460 2988 36ef68992a056afb1eb890b1a02b1e75.exe 30 PID 2988 wrote to memory of 2460 2988 36ef68992a056afb1eb890b1a02b1e75.exe 30 PID 2460 wrote to memory of 2480 2460 7D3B99B52B6.exe 29 PID 2460 wrote to memory of 2480 2460 7D3B99B52B6.exe 29 PID 2460 wrote to memory of 2480 2460 7D3B99B52B6.exe 29 PID 2460 wrote to memory of 2480 2460 7D3B99B52B6.exe 29 PID 2460 wrote to memory of 2480 2460 7D3B99B52B6.exe 29 PID 2460 wrote to memory of 2480 2460 7D3B99B52B6.exe 29 PID 2480 wrote to memory of 2988 2480 NLS115F.exe 14 PID 2480 wrote to memory of 2988 2480 NLS115F.exe 14 PID 2480 wrote to memory of 2988 2480 NLS115F.exe 14 PID 2480 wrote to memory of 2988 2480 NLS115F.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\36ef68992a056afb1eb890b1a02b1e75.exe"C:\Users\Admin\AppData\Local\Temp\36ef68992a056afb1eb890b1a02b1e75.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\win32\7D3B99B52B6.exe"C:\win32\7D3B99B52B6.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\NLS115F.exe"C:\Users\Admin\AppData\Local\Temp\NLS115F.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5c2dc4eb0a7232af6c9d5ae716fe40544
SHA1bdde130ba4edf325f969e0797fe2a352ea688b66
SHA256fa656cf919c877fe3307ab41e609f1086c3e8d2acd8b29e7cb4f592492ede583
SHA5129b2fc56b204dbc724f1e1a14ed41032e47c643be436984202d899537959757380a90c11d716de17b129f7cdb3ffc9093759de9b19bdddcd34c6e0d646efaa849
-
Filesize
746KB
MD536ef68992a056afb1eb890b1a02b1e75
SHA1601bec3e30fc479615161fa18eb29dc9bba5bcf6
SHA25647dc2451bf9264a8b01f95ecf99e2212c7b8fa88c34b9808ac19af3adfc59132
SHA512242a651550fa7f2c8682bf95b386ebb27ac6e7dad9b05796d467559a37ff557188a9b021eb374710cb93b171583ade0c60609149e0e36d7e3d2eca5139605bee