Analysis

  • max time kernel
    121s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 22:09

General

  • Target

    1e0664644c9b63658f7e12ecd2b39606.exe

  • Size

    68KB

  • MD5

    1e0664644c9b63658f7e12ecd2b39606

  • SHA1

    8d841d110148a81bc6747686b567e0f0f6818e67

  • SHA256

    03cb1d958beb27206585f70c4b5f99c6dccf11bc76891f9e9010bdf855e12a9a

  • SHA512

    a30a4a4607a796c919e98e00779a1d1207ba76adb17bc1442a6c5cc8fd1711b1ffbd11410bccef638c97a23b2bbd0b7d1ce69d387bdc9e18607f8691da999df8

  • SSDEEP

    768:e+tsu6DGJ2i20sLfutDQQQu3M0YNSeffWrIKt83Gls:e+tsRMy0sDaQQQQeffVOs

Score
8/10

Malware Config

Signatures

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e0664644c9b63658f7e12ecd2b39606.exe
    "C:\Users\Admin\AppData\Local\Temp\1e0664644c9b63658f7e12ecd2b39606.exe"
    1⤵
    • Disables RegEdit via registry modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\ErrorPageTemplate[1]

          Filesize

          2KB

          MD5

          f4fe1cb77e758e1ba56b8a8ec20417c5

          SHA1

          f4eda06901edb98633a686b11d02f4925f827bf0

          SHA256

          8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f

          SHA512

          62514ab345b6648c5442200a8e9530dfb88a0355e262069e0a694289c39a4a1c06c6143e5961074bfac219949102a416c09733f24e8468984b96843dc222b436

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\background_gradient[1]

          Filesize

          453B

          MD5

          20f0110ed5e4e0d5384a496e4880139b

          SHA1

          51f5fc61d8bf19100df0f8aadaa57fcd9c086255

          SHA256

          1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b

          SHA512

          5f52c117e346111d99d3b642926139178a80b9ec03147c00e27f07aab47fe38e9319fe983444f3e0e36def1e86dd7c56c25e44b14efdc3f13b45ededa064db5a

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\httpErrorPagesScripts[2]

          Filesize

          8KB

          MD5

          3f57b781cb3ef114dd0b665151571b7b

          SHA1

          ce6a63f996df3a1cccb81720e21204b825e0238c

          SHA256

          46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

          SHA512

          8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\info_48[1]

          Filesize

          4KB

          MD5

          5565250fcc163aa3a79f0b746416ce69

          SHA1

          b97cc66471fcdee07d0ee36c7fb03f342c231f8f

          SHA256

          51129c6c98a82ea491f89857c31146ecec14c4af184517450a7a20c699c84859

          SHA512

          e60ea153b0fece4d311769391d3b763b14b9a140105a36a13dad23c2906735eaab9092236deb8c68ef078e8864d6e288bef7ef1731c1e9f1ad9b0170b95ac134

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\bullet[1]

          Filesize

          447B

          MD5

          26f971d87ca00e23bd2d064524aef838

          SHA1

          7440beff2f4f8fabc9315608a13bf26cabad27d9

          SHA256

          1d8e5fd3c1fd384c0a7507e7283c7fe8f65015e521b84569132a7eabedc9d41d

          SHA512

          c62eb51be301bb96c80539d66a73cd17ca2021d5d816233853a37db72e04050271e581cc99652f3d8469b390003ca6c62dad2a9d57164c620b7777ae99aa1b15

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\errorPageStrings[1]

          Filesize

          2KB

          MD5

          e3e4a98353f119b80b323302f26b78fa

          SHA1

          20ee35a370cdd3a8a7d04b506410300fd0a6a864

          SHA256

          9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

          SHA512

          d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\down[1]

          Filesize

          748B

          MD5

          c4f558c4c8b56858f15c09037cd6625a

          SHA1

          ee497cc061d6a7a59bb66defea65f9a8145ba240

          SHA256

          39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781

          SHA512

          d60353d3fbea2992d96795ba30b20727b022b9164b2094b922921d33ca7ce1634713693ac191f8f5708954544f7648f4840bcd5b62cb6a032ef292a8b0e52a44

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\http_404_webOC[1]

          Filesize

          6KB

          MD5

          92ab50175c4b03970f264c637c78febe

          SHA1

          b00fbe1169da972ba4a4a84871af9eca7479000a

          SHA256

          3926c545ae82fc264c98d6c229a8a0999e2b59ed2bb736f1bda9e2f89e0eeac8

          SHA512

          3311f118963ad1eaf1b9c7fb10b67280aae1ab38358aed77c10f2587100427af58c7d008abb46ad0f59880ac51e50b5a53fc2c2a96d70f5ece4578ab72382b7a

        • memory/2056-4-0x0000000003CE0000-0x0000000004D42000-memory.dmp

          Filesize

          16.4MB