Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
0083b07dba712fd09d10ea70c3eb5491.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0083b07dba712fd09d10ea70c3eb5491.exe
Resource
win10v2004-20231215-en
General
-
Target
0083b07dba712fd09d10ea70c3eb5491.exe
-
Size
536KB
-
MD5
0083b07dba712fd09d10ea70c3eb5491
-
SHA1
b18251868a1afba068b4462e452a7ec424f614ab
-
SHA256
2643b5d2aa78a1784f5d59bb71e00283af5bc81f4ff7c14b5d3532bffcf03221
-
SHA512
368de9e2179c3ae7ed12b197ca32500c89c59cb37dd824cedd9115e7dcf1b04c2ff70e296ba81038d1eca0eb68aa5b2029a9196f502cef9c1ddeede3ab066b3f
-
SSDEEP
12288:6MMnMMMMMUQEXhRgxrdXtzGcApWZehcZ4UScVQ2pt:6MMnMMMMMnSh+xfaVpWZScocVQ2pt
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 3044 BOxnsLJoBqtiUfF.exe -
Loads dropped DLL 1 IoCs
pid Process 3040 0083b07dba712fd09d10ea70c3eb5491.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\BOxnsLJoBqtiUfF = "C:\\ProgramData\\BOxnsLJoBqtiUfF.exe" 0083b07dba712fd09d10ea70c3eb5491.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Download 0083b07dba712fd09d10ea70c3eb5491.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 0083b07dba712fd09d10ea70c3eb5491.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3040 0083b07dba712fd09d10ea70c3eb5491.exe 3040 0083b07dba712fd09d10ea70c3eb5491.exe 3044 BOxnsLJoBqtiUfF.exe 3044 BOxnsLJoBqtiUfF.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3040 0083b07dba712fd09d10ea70c3eb5491.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 3044 3040 0083b07dba712fd09d10ea70c3eb5491.exe 28 PID 3040 wrote to memory of 3044 3040 0083b07dba712fd09d10ea70c3eb5491.exe 28 PID 3040 wrote to memory of 3044 3040 0083b07dba712fd09d10ea70c3eb5491.exe 28 PID 3040 wrote to memory of 3044 3040 0083b07dba712fd09d10ea70c3eb5491.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 0083b07dba712fd09d10ea70c3eb5491.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0083b07dba712fd09d10ea70c3eb5491.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0083b07dba712fd09d10ea70c3eb5491.exe"C:\Users\Admin\AppData\Local\Temp\0083b07dba712fd09d10ea70c3eb5491.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3040 -
C:\ProgramData\BOxnsLJoBqtiUfF.exe"C:\ProgramData\BOxnsLJoBqtiUfF.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5a4abb918997969cf59ecfd2a599b2fb8
SHA12d0086f1193429543f87263cc56eca17dd567fe0
SHA256dde49e92c44529e60309104da4b3b2f81b83f97baeea0c657cb1e06f962a58be
SHA5125686a2bd29ee7fdabcae8cfe4b52d240252bbd1ba1c303aba6aef15c5337d29e3f3d8a7a9c63847a0f3687cb60679e5aa2c7de47465d6e89e730c928c3e92598
-
Filesize
140KB
MD53f769a57418ee4240d8882907afe57dd
SHA10f9de316f66419be8ca1184ffbdb9f7176131e6a
SHA256378fc6242a0475f4fee09f3d01c8ba6fa4dba246e46e1b0ed04f4f01884508ea
SHA51204c860b72e410de3af8245e7b56f56e585aca63c4e04b5ecfde60674ead52861625baed6cb8d1320232570633c500e8cc0e23603654a7c59b878273e50abc057