Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
1e0664644c9b63658f7e12ecd2b39606.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e0664644c9b63658f7e12ecd2b39606.exe
Resource
win10v2004-20231215-en
General
-
Target
1e0664644c9b63658f7e12ecd2b39606.exe
-
Size
68KB
-
MD5
1e0664644c9b63658f7e12ecd2b39606
-
SHA1
8d841d110148a81bc6747686b567e0f0f6818e67
-
SHA256
03cb1d958beb27206585f70c4b5f99c6dccf11bc76891f9e9010bdf855e12a9a
-
SHA512
a30a4a4607a796c919e98e00779a1d1207ba76adb17bc1442a6c5cc8fd1711b1ffbd11410bccef638c97a23b2bbd0b7d1ce69d387bdc9e18607f8691da999df8
-
SSDEEP
768:e+tsu6DGJ2i20sLfutDQQQu3M0YNSeffWrIKt83Gls:e+tsRMy0sDaQQQQeffVOs
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1e0664644c9b63658f7e12ecd2b39606.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Setup 1e0664644c9b63658f7e12ecd2b39606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Crack 1e0664644c9b63658f7e12ecd2b39606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Keygen 1e0664644c9b63658f7e12ecd2b39606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Japanese 1e0664644c9b63658f7e12ecd2b39606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\avgirlmovie 1e0664644c9b63658f7e12ecd2b39606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\1e0664644c9b63658f7e12ecd2b39606 = "C:\\Program Files\\Update04\\1e0664644c9b63658f7e12ecd2b39606.exe" 1e0664644c9b63658f7e12ecd2b39606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSConfig 1e0664644c9b63658f7e12ecd2b39606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Install 1e0664644c9b63658f7e12ecd2b39606.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cmd.exe 1e0664644c9b63658f7e12ecd2b39606.exe File opened for modification C:\Windows\SysWOW64\regedit.exe 1e0664644c9b63658f7e12ecd2b39606.exe File opened for modification C:\Windows\SysWOW64\taskmgr.exe 1e0664644c9b63658f7e12ecd2b39606.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Update04\1e0664644c9b63658f7e12ecd2b39606.exe 1e0664644c9b63658f7e12ecd2b39606.exe File opened for modification C:\Program Files\Update04\1e0664644c9b63658f7e12ecd2b39606.exe 1e0664644c9b63658f7e12ecd2b39606.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 1e0664644c9b63658f7e12ecd2b39606.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2056 1e0664644c9b63658f7e12ecd2b39606.exe 2056 1e0664644c9b63658f7e12ecd2b39606.exe 2056 1e0664644c9b63658f7e12ecd2b39606.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e0664644c9b63658f7e12ecd2b39606.exe"C:\Users\Admin\AppData\Local\Temp\1e0664644c9b63658f7e12ecd2b39606.exe"1⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\ErrorPageTemplate[1]
Filesize2KB
MD5f4fe1cb77e758e1ba56b8a8ec20417c5
SHA1f4eda06901edb98633a686b11d02f4925f827bf0
SHA2568d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f
SHA51262514ab345b6648c5442200a8e9530dfb88a0355e262069e0a694289c39a4a1c06c6143e5961074bfac219949102a416c09733f24e8468984b96843dc222b436
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\background_gradient[1]
Filesize453B
MD520f0110ed5e4e0d5384a496e4880139b
SHA151f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA2561471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
SHA5125f52c117e346111d99d3b642926139178a80b9ec03147c00e27f07aab47fe38e9319fe983444f3e0e36def1e86dd7c56c25e44b14efdc3f13b45ededa064db5a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\httpErrorPagesScripts[2]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\info_48[1]
Filesize4KB
MD55565250fcc163aa3a79f0b746416ce69
SHA1b97cc66471fcdee07d0ee36c7fb03f342c231f8f
SHA25651129c6c98a82ea491f89857c31146ecec14c4af184517450a7a20c699c84859
SHA512e60ea153b0fece4d311769391d3b763b14b9a140105a36a13dad23c2906735eaab9092236deb8c68ef078e8864d6e288bef7ef1731c1e9f1ad9b0170b95ac134
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\bullet[1]
Filesize447B
MD526f971d87ca00e23bd2d064524aef838
SHA17440beff2f4f8fabc9315608a13bf26cabad27d9
SHA2561d8e5fd3c1fd384c0a7507e7283c7fe8f65015e521b84569132a7eabedc9d41d
SHA512c62eb51be301bb96c80539d66a73cd17ca2021d5d816233853a37db72e04050271e581cc99652f3d8469b390003ca6c62dad2a9d57164c620b7777ae99aa1b15
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\down[1]
Filesize748B
MD5c4f558c4c8b56858f15c09037cd6625a
SHA1ee497cc061d6a7a59bb66defea65f9a8145ba240
SHA25639e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781
SHA512d60353d3fbea2992d96795ba30b20727b022b9164b2094b922921d33ca7ce1634713693ac191f8f5708954544f7648f4840bcd5b62cb6a032ef292a8b0e52a44
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\http_404_webOC[1]
Filesize6KB
MD592ab50175c4b03970f264c637c78febe
SHA1b00fbe1169da972ba4a4a84871af9eca7479000a
SHA2563926c545ae82fc264c98d6c229a8a0999e2b59ed2bb736f1bda9e2f89e0eeac8
SHA5123311f118963ad1eaf1b9c7fb10b67280aae1ab38358aed77c10f2587100427af58c7d008abb46ad0f59880ac51e50b5a53fc2c2a96d70f5ece4578ab72382b7a