Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
204e970f9730464fefe3dbd984697fd7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
204e970f9730464fefe3dbd984697fd7.exe
Resource
win10v2004-20231215-en
General
-
Target
204e970f9730464fefe3dbd984697fd7.exe
-
Size
501KB
-
MD5
204e970f9730464fefe3dbd984697fd7
-
SHA1
3751cf14e10f9e58cba4a2c3e488499dcceda057
-
SHA256
e7432c4bbd650bf0adf901103d7e5d5b535c4c4ffd32edd362baac5a444c8841
-
SHA512
6f9f904d988319e46a51041a1bddb68082d6b6ddc1f6a23705daacd95ed54c4f71016b00873414590a606916601f42c44e9a0ad26b7f056111ae013f7aed8e8a
-
SSDEEP
12288:juXFcrQVuGYz+7vjvkVa/JWVQUUUJG8XnrxAn70Fu6:6ckAs9JWiUo8XNqL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2960 mA42900EfAlK42900.exe -
Executes dropped EXE 1 IoCs
pid Process 2960 mA42900EfAlK42900.exe -
Loads dropped DLL 2 IoCs
pid Process 2432 204e970f9730464fefe3dbd984697fd7.exe 2432 204e970f9730464fefe3dbd984697fd7.exe -
resource yara_rule behavioral1/memory/2432-1-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2432-17-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2960-29-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2960-39-0x0000000000400000-0x00000000004CF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\mA42900EfAlK42900 = "C:\\ProgramData\\mA42900EfAlK42900\\mA42900EfAlK42900.exe" mA42900EfAlK42900.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main mA42900EfAlK42900.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2432 204e970f9730464fefe3dbd984697fd7.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2432 204e970f9730464fefe3dbd984697fd7.exe Token: SeDebugPrivilege 2960 mA42900EfAlK42900.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2960 mA42900EfAlK42900.exe 2960 mA42900EfAlK42900.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2960 2432 204e970f9730464fefe3dbd984697fd7.exe 28 PID 2432 wrote to memory of 2960 2432 204e970f9730464fefe3dbd984697fd7.exe 28 PID 2432 wrote to memory of 2960 2432 204e970f9730464fefe3dbd984697fd7.exe 28 PID 2432 wrote to memory of 2960 2432 204e970f9730464fefe3dbd984697fd7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\204e970f9730464fefe3dbd984697fd7.exe"C:\Users\Admin\AppData\Local\Temp\204e970f9730464fefe3dbd984697fd7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\ProgramData\mA42900EfAlK42900\mA42900EfAlK42900.exe"C:\ProgramData\mA42900EfAlK42900\mA42900EfAlK42900.exe" "C:\Users\Admin\AppData\Local\Temp\204e970f9730464fefe3dbd984697fd7.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD570182e35942b6183a3a14b4418da183b
SHA179abcf4e7fe2bb8fce25fbf9e3e6742ab947622f
SHA2568c23fb89b9d6d153b0c7ab851453fa969f6df9741422b2b9d94dda8fd4ca3216
SHA512e8f5ddd76cc0e3860a56a7dc7203b8148eb824c807c012302ce5169e2ede2844ae43828a5df1a74d0862ffc3fe86924f26ccc06bf2433c2aeb2db9b81372afa7
-
Filesize
501KB
MD5a1534ce9c152eb7aa16ae4d99e9cc80e
SHA129f787e41dd7812029c5558f87b427ebb6fac864
SHA256e3a3578c4df9d5dbe1db6d5d6779595b07f96e7c795f2939339c9f5ab0df35a5
SHA5120a637859aa6e4f030a2a52fe4401eb74255f15830109d9a7605eb831190180f9d6452cf62a034a9d36e8a38bebfa4c18981893cdd8f1100cf3a25c38a5a80bd2