Overview
overview
7Static
static
71.vbs
windows7-x64
11.vbs
windows10-2004-x64
13.bat
windows7-x64
13.bat
windows10-2004-x64
13.vbs
windows7-x64
33.vbs
windows10-2004-x64
3bho.exe
windows7-x64
3bho.exe
windows10-2004-x64
3t2.exe
windows7-x64
7t2.exe
windows10-2004-x64
7test.exe
windows7-x64
7test.exe
windows10-2004-x64
7Analysis
-
max time kernel
132s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 08:03
Behavioral task
behavioral1
Sample
1.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1.vbs
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
3.bat
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
3.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
3.vbs
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
3.vbs
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
bho.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
bho.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
t2.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
t2.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
test.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
test.exe
Resource
win10v2004-20231215-en
General
-
Target
test.exe
-
Size
12.9MB
-
MD5
e46c418d5255120e38f6247e1e7ac53f
-
SHA1
4cb4ff59b4c70cf7a2f9db4e0f2a8cb1a7a7c6bf
-
SHA256
b0c5d558a765f6310b1235d7230358edddbb98ca3b3f4e09be0a644aa4ecb8e9
-
SHA512
eab3f14ac94e0b1beb074c41a3007c8e55c1dfe0818b469e9e739133e79b7e99573753feec5077dfade699b82009144817d500903c356dcc1eb44b03084cf14f
-
SSDEEP
6144:jKxQooikzqDSee+TTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTc:2xQNiHSz1
Malware Config
Signatures
-
resource yara_rule behavioral12/memory/2036-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral12/memory/2036-79-0x0000000000400000-0x0000000000423000-memory.dmp upx -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 130000000000000000000000300000001400000016000000010000000007000080010000030000000103000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 test.exe Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBarLayout = 110000005c00000000000000340000001f0000006e00000001000000a0060000a00f000005000000220400002600000002000000a1060000a00f000004000000a10000000f02000003000000a10200003b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 test.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser test.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172B
MD554aeeca3aa6daa3d6ac9f3f0a579b7c7
SHA1e4c4da9c1161f7e6b39ad0c256d21e06d1da5215
SHA25656c08525cae56d2c103322a677dbfa8d5b4a9fb317bd59036f75cc692f157c17
SHA5120a8c1586d0b36bb10e9108bc3208b0e86a88b214c34a7f4c5bcc083e7bbe2fc474ad2878c9fc42a07f3a2baafd376b38100ad0f76cac53707fa254bec02b2aa4