Analysis
-
max time kernel
142s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
19b3f52c0ada0bd2bee71d7744b3c9c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19b3f52c0ada0bd2bee71d7744b3c9c1.exe
Resource
win10v2004-20231215-en
General
-
Target
19b3f52c0ada0bd2bee71d7744b3c9c1.exe
-
Size
592KB
-
MD5
19b3f52c0ada0bd2bee71d7744b3c9c1
-
SHA1
30294ce2627bb467ceadfa92186d627dab60e77b
-
SHA256
bf62d4833960e5c82cec8236efd58ed16964b9e57fc0ba803bb461f22847768e
-
SHA512
f993afb6aea5b75cec1dda46a5de6a3e0a86046287f090e37c10913abd74de16746c5df5c28c594600f670d5f3319de879a18305532cb745f119b2b690fc7f5c
-
SSDEEP
12288:gfw5jx97iTFHwZ4R4ymmF3Z4mxxwV1quiY3+tK4TTxd:35jP7UGE4KQmXwMYY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2900 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2872 System -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat System -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\system\System 19b3f52c0ada0bd2bee71d7744b3c9c1.exe File opened for modification C:\Windows\system\System 19b3f52c0ada0bd2bee71d7744b3c9c1.exe File created C:\Windows\Delete.bat 19b3f52c0ada0bd2bee71d7744b3c9c1.exe -
Modifies data under HKEY_USERS 37 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick System Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings System Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-09-c6-9f-36-75\WpadDecisionReason = "1" System Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" System Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" System Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm System Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties System Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0076000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 System Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D62720FC-39A1-4F46-B983-9160B1E30FC8}\WpadDecisionReason = "1" System Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-09-c6-9f-36-75 System Key created \REGISTRY\USER\.DEFAULT\System System Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad System Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D62720FC-39A1-4F46-B983-9160B1E30FC8}\aa-09-c6-9f-36-75 System Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix System Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet System Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties System Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-09-c6-9f-36-75\WpadDecisionTime = 009a6a13643eda01 System Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ System Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections System Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-09-c6-9f-36-75\WpadDecisionTime = e0f1aa5e643eda01 System Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" System Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D62720FC-39A1-4F46-B983-9160B1E30FC8}\WpadDecisionTime = 009a6a13643eda01 System Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-09-c6-9f-36-75\WpadDecision = "0" System Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-09-c6-9f-36-75\WpadDetectedUrl System Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0076000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 System Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" System Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D62720FC-39A1-4F46-B983-9160B1E30FC8}\WpadDecisionTime = e0f1aa5e643eda01 System Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" System Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 System Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D62720FC-39A1-4F46-B983-9160B1E30FC8} System Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D62720FC-39A1-4F46-B983-9160B1E30FC8}\WpadDecision = "0" System Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D62720FC-39A1-4F46-B983-9160B1E30FC8}\WpadNetworkName = "Network 3" System Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control System Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm System Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings System Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 System Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" System -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 System -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2900 2552 19b3f52c0ada0bd2bee71d7744b3c9c1.exe 29 PID 2552 wrote to memory of 2900 2552 19b3f52c0ada0bd2bee71d7744b3c9c1.exe 29 PID 2552 wrote to memory of 2900 2552 19b3f52c0ada0bd2bee71d7744b3c9c1.exe 29 PID 2552 wrote to memory of 2900 2552 19b3f52c0ada0bd2bee71d7744b3c9c1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\19b3f52c0ada0bd2bee71d7744b3c9c1.exe"C:\Users\Admin\AppData\Local\Temp\19b3f52c0ada0bd2bee71d7744b3c9c1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Delete.bat2⤵
- Deletes itself
PID:2900
-
-
C:\Windows\system\SystemC:\Windows\system\System1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
PID:2872
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD5594efc25e6bddd08f26a4206d1e76a1b
SHA1ed6d65089611541da75572a4ea50ed131c42c89c
SHA256090ad02e606ec380f42cf3889f6cc48e50773027abcb4d5241878b2dc39c017d
SHA51254b9189c0ef151e014aea2bb5ca5e2c3af33b9c82e068aa9aee8d5935e0e9e2b7122922ba3df7a7acf2936adb89dd636696803c3fe9a6752275c6c70b8b724f4
-
Filesize
592KB
MD519b3f52c0ada0bd2bee71d7744b3c9c1
SHA130294ce2627bb467ceadfa92186d627dab60e77b
SHA256bf62d4833960e5c82cec8236efd58ed16964b9e57fc0ba803bb461f22847768e
SHA512f993afb6aea5b75cec1dda46a5de6a3e0a86046287f090e37c10913abd74de16746c5df5c28c594600f670d5f3319de879a18305532cb745f119b2b690fc7f5c
-
Filesize
129KB
MD5b7cc8a911c06ec2ae15db2cdcd73fe9c
SHA15ca2b3d6db993376abca7ac61a2e04be1e216b30
SHA25663e8b0e6816f56f70eb38a285499874aae6b5d336ca68fe8dab2d618e2e7b2eb
SHA512cf57ac4fed26d03c4d28a138734b7d40494d8fb5ae7a9581b56e213a1f969d346414e3aa9669e18a9fa18adf48fc842bccd845b3391fde70ba26e5bb1d493d74