Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 20:30
Static task
static1
Behavioral task
behavioral1
Sample
f6106d6c0a281463a2db433605687fa9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f6106d6c0a281463a2db433605687fa9.exe
Resource
win10v2004-20231215-en
General
-
Target
f6106d6c0a281463a2db433605687fa9.exe
-
Size
755KB
-
MD5
f6106d6c0a281463a2db433605687fa9
-
SHA1
c6191b2cf9b7c1a2f21a4745c5be706385c56229
-
SHA256
05c3ffeeab468811796a2f16d56b43500d0e27cfd9556f42aeff7ad998f7b21c
-
SHA512
af47e9df7bbda150e283920860dffe3d024befdac22a88838388dc28d0775bd32b25fbd512ec2d8aeba18ea22aece1d6830237eac1a3a0ac9f117940129afc55
-
SSDEEP
12288:1QN20eCofhgVDNuK40ufbN64b6slOJ5B/N2j+aFUnQn53CI2tjyufeKe0:K40eCoJgD8H3T04nARN2H6nQn53lQjyY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2352 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 2964 f6106d6c0a281463a2db433605687fa9.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 setup.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2964 f6106d6c0a281463a2db433605687fa9.exe 2964 f6106d6c0a281463a2db433605687fa9.exe 2352 setup.exe 2352 setup.exe 2352 setup.exe 2352 setup.exe 2352 setup.exe 2352 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2352 2964 f6106d6c0a281463a2db433605687fa9.exe 28 PID 2964 wrote to memory of 2352 2964 f6106d6c0a281463a2db433605687fa9.exe 28 PID 2964 wrote to memory of 2352 2964 f6106d6c0a281463a2db433605687fa9.exe 28 PID 2964 wrote to memory of 2352 2964 f6106d6c0a281463a2db433605687fa9.exe 28 PID 2964 wrote to memory of 2352 2964 f6106d6c0a281463a2db433605687fa9.exe 28 PID 2964 wrote to memory of 2352 2964 f6106d6c0a281463a2db433605687fa9.exe 28 PID 2964 wrote to memory of 2352 2964 f6106d6c0a281463a2db433605687fa9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6106d6c0a281463a2db433605687fa9.exe"C:\Users\Admin\AppData\Local\Temp\f6106d6c0a281463a2db433605687fa9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c008bccbd545bb1f956ba6cf88f21b9
SHA1cf77c131f74a520e1b748851da0d88e0a126d55d
SHA25685f052b8dfee3889b5fd0aecc43e386953893e93c36ae7a6af9d5ed2ca3c0a96
SHA512095a8dd957dd8cc3bbcf3e65fff8976a8396ea54262d232b4a423f807808e5dec5fefbd15ace180fa971d99297c84bffd797d76ba4d9a122cf6f3203f744716f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5525be0edb51e0c75991e4564cf913cf6
SHA17ef1fc65934ae4853eade2ab3077095ab96b69c7
SHA256e2f4d72257d3b936f6084a33a11acd7506052a52f957a6234524b55c4e0ca354
SHA5126d35763b9538fad55e5aed8b177e492fd9e140ef0e1a65e9dc4b30f153db37cbf950fe15beb7d4cf4e36f2d891db5214067cee284f0ab09c2d59bb99fada196b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
755KB
MD5f6106d6c0a281463a2db433605687fa9
SHA1c6191b2cf9b7c1a2f21a4745c5be706385c56229
SHA25605c3ffeeab468811796a2f16d56b43500d0e27cfd9556f42aeff7ad998f7b21c
SHA512af47e9df7bbda150e283920860dffe3d024befdac22a88838388dc28d0775bd32b25fbd512ec2d8aeba18ea22aece1d6830237eac1a3a0ac9f117940129afc55