Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
0e9cc428e61ab9f2d1f9bb170a5174ed.exe
Resource
win7-20231129-en
General
-
Target
0e9cc428e61ab9f2d1f9bb170a5174ed.exe
-
Size
59KB
-
MD5
0e9cc428e61ab9f2d1f9bb170a5174ed
-
SHA1
8941e373135428454f813af893b8a8d0bff4037c
-
SHA256
6529c39d22f5e76b065ce3e942b32bcf94fec583943d827f6dc2a5275d8d33c9
-
SHA512
da1e56c1a1558fe5022ec1cd777e6e903ec2673a7fdb65e168a12b9e633067c37d2d74f00eed499c67be7d8da8fd0d8f34b43c64d51a86b40e3c9600dd217238
-
SSDEEP
1536:bSnb9W4TPQopkJbFAAQJ8C8j9zCxS3ZxoLlPz76wiKeXVUQY:8blMZoJ4CxmZORPqVhXGt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2712 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2596 ac32.exe -
Loads dropped DLL 2 IoCs
pid Process 2712 cmd.exe 2712 cmd.exe -
resource yara_rule behavioral1/memory/2356-3-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/2356-26-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/2596-34-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/2596-52-0x0000000000400000-0x00000000004B2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ac32 = "C:\\Windows\\system32\\ac32.exe" 0e9cc428e61ab9f2d1f9bb170a5174ed.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0e9cc428e61ab9f2d1f9bb170a5174ed.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ac32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ac32.exe 0e9cc428e61ab9f2d1f9bb170a5174ed.exe File opened for modification C:\Windows\SysWOW64\ac32.exe 0e9cc428e61ab9f2d1f9bb170a5174ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main ac32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main 0e9cc428e61ab9f2d1f9bb170a5174ed.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 0e9cc428e61ab9f2d1f9bb170a5174ed.exe 2356 0e9cc428e61ab9f2d1f9bb170a5174ed.exe 2356 0e9cc428e61ab9f2d1f9bb170a5174ed.exe 2596 ac32.exe 2596 ac32.exe 2596 ac32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2712 2356 0e9cc428e61ab9f2d1f9bb170a5174ed.exe 30 PID 2356 wrote to memory of 2712 2356 0e9cc428e61ab9f2d1f9bb170a5174ed.exe 30 PID 2356 wrote to memory of 2712 2356 0e9cc428e61ab9f2d1f9bb170a5174ed.exe 30 PID 2356 wrote to memory of 2712 2356 0e9cc428e61ab9f2d1f9bb170a5174ed.exe 30 PID 2712 wrote to memory of 2596 2712 cmd.exe 28 PID 2712 wrote to memory of 2596 2712 cmd.exe 28 PID 2712 wrote to memory of 2596 2712 cmd.exe 28 PID 2712 wrote to memory of 2596 2712 cmd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e9cc428e61ab9f2d1f9bb170a5174ed.exe"C:\Users\Admin\AppData\Local\Temp\0e9cc428e61ab9f2d1f9bb170a5174ed.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0e9cc428e61ab9f2d1f9bb170a5174ed.bat" 0"2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712
-
-
C:\Windows\SysWOW64\ac32.exeC:\Windows\system32\ac32.exe /B1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD576e15671581527f0b5e3249231a7524f
SHA1a42e5f4401b4d8cc9c182ea496b8f3c3d0a3e937
SHA25658aa55c41bc3246632b499ddadffc3c7fc3f734038c894bb2126b0f3569efce1
SHA5127d3c3e87157d950cf021cb8b10e93b5bc3a6384e766517b3fbecd11377906cd9ff6cc93ed339bde2de111e7b643dabf92d7680547c7d49598cf1acd8e80defdc