Overview
overview
7Static
static
71.vbs
windows7-x64
11.vbs
windows10-2004-x64
13.bat
windows7-x64
13.bat
windows10-2004-x64
13.vbs
windows7-x64
33.vbs
windows10-2004-x64
3bho.exe
windows7-x64
3bho.exe
windows10-2004-x64
3t2.exe
windows7-x64
7t2.exe
windows10-2004-x64
7test.exe
windows7-x64
7test.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:03
Behavioral task
behavioral1
Sample
1.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1.vbs
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
3.bat
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
3.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
3.vbs
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
3.vbs
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
bho.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
bho.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
t2.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
t2.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
test.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
test.exe
Resource
win10v2004-20231215-en
General
-
Target
t2.exe
-
Size
12.9MB
-
MD5
d3057c3d1f19e6704bb409a2f5438f51
-
SHA1
f7eefb745d828f11455d5a971724e549bdd5ed95
-
SHA256
cb3b565e3c5b9f7d1f073781e987c58fdbaa254a201bd5fff6d41f45ad8776ff
-
SHA512
1585d7ec9b6119a1453bea55b2f41b17ac3778c0b8ea823ce03a262247af6ac45262cebcc8400103ed25d697f3057dc6b79d207f23142d48ef005531269830b9
-
SSDEEP
6144:veKTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTq:v6
Malware Config
Signatures
-
resource yara_rule behavioral9/memory/2508-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral9/memory/2508-6-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\micrososot = "c:\\users\\admin\\appdata\\local\\temp\\t2.exe " reg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Survival_0.txt t2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main t2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2508 t2.exe 2508 t2.exe 2508 t2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2908 2508 t2.exe 30 PID 2508 wrote to memory of 2908 2508 t2.exe 30 PID 2508 wrote to memory of 2908 2508 t2.exe 30 PID 2508 wrote to memory of 2908 2508 t2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\t2.exe"C:\Users\Admin\AppData\Local\Temp\t2.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "micrososot" /d "c:\users\admin\appdata\local\temp\t2.exe " /f2⤵
- Adds Run key to start application
PID:2908
-