Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
7ed1ce999b766dbd8b1e1c899baaa767.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ed1ce999b766dbd8b1e1c899baaa767.exe
Resource
win10v2004-20231222-en
General
-
Target
7ed1ce999b766dbd8b1e1c899baaa767.exe
-
Size
75KB
-
MD5
7ed1ce999b766dbd8b1e1c899baaa767
-
SHA1
2e649e9564dcd2419bfe46eb91caff6d636402fe
-
SHA256
cb82aed24d3df3247b3ca09657dedb18e492ac0a0b97fb79d267746087ac4271
-
SHA512
ff6a61bcd25a6caf3c0f35bdfbc804b21227515eafedf4ec976e895ad716797e064fe00733ee4f0cfe16931d7123950c2ac6cdd8e9eb9e6cd35a2f238371d2b5
-
SSDEEP
1536:IZTvSiPEutHwHiHoHV/NBbgzrqNldFCnDNlN1t7gH:uTvSic/NBbgzrqNldFCnDNlN1S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" laoun.exe -
Executes dropped EXE 1 IoCs
pid Process 1340 laoun.exe -
Loads dropped DLL 2 IoCs
pid Process 2156 7ed1ce999b766dbd8b1e1c899baaa767.exe 2156 7ed1ce999b766dbd8b1e1c899baaa767.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\laoun = "C:\\Users\\Admin\\laoun.exe" laoun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe 1340 laoun.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2156 7ed1ce999b766dbd8b1e1c899baaa767.exe 1340 laoun.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1340 2156 7ed1ce999b766dbd8b1e1c899baaa767.exe 28 PID 2156 wrote to memory of 1340 2156 7ed1ce999b766dbd8b1e1c899baaa767.exe 28 PID 2156 wrote to memory of 1340 2156 7ed1ce999b766dbd8b1e1c899baaa767.exe 28 PID 2156 wrote to memory of 1340 2156 7ed1ce999b766dbd8b1e1c899baaa767.exe 28 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19 PID 1340 wrote to memory of 2156 1340 laoun.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ed1ce999b766dbd8b1e1c899baaa767.exe"C:\Users\Admin\AppData\Local\Temp\7ed1ce999b766dbd8b1e1c899baaa767.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\laoun.exe"C:\Users\Admin\laoun.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5a5d75a9af0e71b8c5d6a860a52cb1677
SHA1aa0c79bd62fd2afdd1834818de498460ec89ea46
SHA256ad01eba0c3d1369eba741ac2ddc702adc1ec1136ee077fe901805ebaf0b68acc
SHA512d19e1572014b82650c61897689297d890d1fe644f29f4833cf03c7adb17d019a2ce713eaa11e4bc77a74c083407726597e3cf0ade38073833b455d197f5ad8e7