Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
017bf1715955bf86ce50019701672081.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
017bf1715955bf86ce50019701672081.exe
Resource
win10v2004-20231215-en
General
-
Target
017bf1715955bf86ce50019701672081.exe
-
Size
1.2MB
-
MD5
017bf1715955bf86ce50019701672081
-
SHA1
3c7dd798ca577f706882ca705910e305d3cc570d
-
SHA256
50dc462a48b96113b0403ce43470a69e2e9eb6cfa0b358bc28481102e31435ab
-
SHA512
e67ca2e704e2a6e9b27133ea2a5d02222c979ec5c2fb8e9185905807b055578dbc6a9f734aa227858fe519b7f043d58ed7c066cea782e2461e60f050771746b4
-
SSDEEP
24576:N0bQMK/FmbOlk51dSJXsHu69FFEYLys8vQr2p49:ihjbOC1daXsO69h98lp49
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 33011715.exe -
Loads dropped DLL 4 IoCs
pid Process 2884 cmd.exe 2884 cmd.exe 2700 33011715.exe 2700 33011715.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\33011715 = "C:\\ProgramData\\33011715\\33011715.exe" 017bf1715955bf86ce50019701672081.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\33011715 = "C:\\PROGRA~3\\33011715\\33011715.exe" 33011715.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2784 taskkill.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Control Panel\Desktop 33011715.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Control Panel\Desktop\_Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" 33011715.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2700 33011715.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 taskkill.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe 2700 33011715.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2780 2120 017bf1715955bf86ce50019701672081.exe 27 PID 2120 wrote to memory of 2780 2120 017bf1715955bf86ce50019701672081.exe 27 PID 2120 wrote to memory of 2780 2120 017bf1715955bf86ce50019701672081.exe 27 PID 2120 wrote to memory of 2780 2120 017bf1715955bf86ce50019701672081.exe 27 PID 2780 wrote to memory of 2784 2780 cmd.exe 29 PID 2780 wrote to memory of 2784 2780 cmd.exe 29 PID 2780 wrote to memory of 2784 2780 cmd.exe 29 PID 2780 wrote to memory of 2784 2780 cmd.exe 29 PID 2780 wrote to memory of 2884 2780 cmd.exe 31 PID 2780 wrote to memory of 2884 2780 cmd.exe 31 PID 2780 wrote to memory of 2884 2780 cmd.exe 31 PID 2780 wrote to memory of 2884 2780 cmd.exe 31 PID 2884 wrote to memory of 2700 2884 cmd.exe 32 PID 2884 wrote to memory of 2700 2884 cmd.exe 32 PID 2884 wrote to memory of 2700 2884 cmd.exe 32 PID 2884 wrote to memory of 2700 2884 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\017bf1715955bf86ce50019701672081.exe"C:\Users\Admin\AppData\Local\Temp\017bf1715955bf86ce50019701672081.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\33011715\33011715.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 017bf1715955bf86ce50019701672081.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\PROGRA~3\33011715\33011715.exe /install3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\PROGRA~3\33011715\33011715.exeC:\PROGRA~3\33011715\33011715.exe /install4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
290B
MD5d35f9f7ef819fb75cd7ffa1cf1379d9a
SHA1c9c8b9de4d1e4c46f717cbac262af9c94d609167
SHA256b563b95e17e0e4d56969d2f03a45ad8b238b27da88701fafac04fcbbe29a13e7
SHA512ef413ac2a1d0150fd232428d131ac003028000a306b1789f2430c52dba5e5a6d8411576b812e8a1e55af334b7609579ae5a10f9dbffb04e4f268bf71d9cab209
-
Filesize
1.2MB
MD5017bf1715955bf86ce50019701672081
SHA13c7dd798ca577f706882ca705910e305d3cc570d
SHA25650dc462a48b96113b0403ce43470a69e2e9eb6cfa0b358bc28481102e31435ab
SHA512e67ca2e704e2a6e9b27133ea2a5d02222c979ec5c2fb8e9185905807b055578dbc6a9f734aa227858fe519b7f043d58ed7c066cea782e2461e60f050771746b4