Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 09:59
Behavioral task
behavioral1
Sample
6592f54c24f1a54cd7c4b746af2334e7.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
6592f54c24f1a54cd7c4b746af2334e7.exe
-
Size
33KB
-
MD5
6592f54c24f1a54cd7c4b746af2334e7
-
SHA1
8969ee224c50ac868ec4473096691eeea61862b5
-
SHA256
d56c7f02875c741b23b9c45448e9910d972f14da0be7faaa84339fa6a0cde6f6
-
SHA512
04817c834b0f65dfeab038cba0f9e098dc4720850c254fe309d17db7aedd9002ca53b6e35ab8d74ff1b7c56979de2034be584778f9ca0bb4afc130fd868213a8
-
SSDEEP
768:SUi8TihEzr2RajA7c0S80YplZFHPZzFBjsrzVCRi:SNvSGgj+ctiPHlzMzz
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2648-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2648-1-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2940-2-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2940-3-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9963387B-212E-4643-B207-82DAEA0E713D} 6592f54c24f1a54cd7c4b746af2334e7.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\PLUGINS\Sy_Win7k.Jmp 6592f54c24f1a54cd7c4b746af2334e7.exe File created C:\Program Files\Internet Explorer\PLUGINS\Wn_Sys8x.Sys 6592f54c24f1a54cd7c4b746af2334e7.exe File created C:\Program Files\Internet Explorer\PLUGINS\Sy_Win7k.Jmp 6592f54c24f1a54cd7c4b746af2334e7.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9963387B-212E-4643-B207-82DAEA0E713D}\InProcServer32 6592f54c24f1a54cd7c4b746af2334e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9963387B-212E-4643-B207-82DAEA0E713D}\InProcServer32\ = "C:\\Program Files\\Internet Explorer\\PLUGINS\\Wn_Sys8x.Sys" 6592f54c24f1a54cd7c4b746af2334e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9963387B-212E-4643-B207-82DAEA0E713D}\InProcServer32\ThreadingModel = "Apartment" 6592f54c24f1a54cd7c4b746af2334e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9963387B-212E-4643-B207-82DAEA0E713D} 6592f54c24f1a54cd7c4b746af2334e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9963387B-212E-4643-B207-82DAEA0E713D}\ 6592f54c24f1a54cd7c4b746af2334e7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2940 2648 6592f54c24f1a54cd7c4b746af2334e7.exe 28 PID 2648 wrote to memory of 2940 2648 6592f54c24f1a54cd7c4b746af2334e7.exe 28 PID 2648 wrote to memory of 2940 2648 6592f54c24f1a54cd7c4b746af2334e7.exe 28 PID 2648 wrote to memory of 2940 2648 6592f54c24f1a54cd7c4b746af2334e7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6592f54c24f1a54cd7c4b746af2334e7.exe"C:\Users\Admin\AppData\Local\Temp\6592f54c24f1a54cd7c4b746af2334e7.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\6592f54c24f1a54cd7c4b746af2334e7.exe"C:\Users\Admin\AppData\Local\Temp\6592f54c24f1a54cd7c4b746af2334e7.exe" Z2⤵
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies registry class
PID:2940
-