Analysis
-
max time kernel
163s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
19b3f52c0ada0bd2bee71d7744b3c9c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19b3f52c0ada0bd2bee71d7744b3c9c1.exe
Resource
win10v2004-20231215-en
General
-
Target
19b3f52c0ada0bd2bee71d7744b3c9c1.exe
-
Size
592KB
-
MD5
19b3f52c0ada0bd2bee71d7744b3c9c1
-
SHA1
30294ce2627bb467ceadfa92186d627dab60e77b
-
SHA256
bf62d4833960e5c82cec8236efd58ed16964b9e57fc0ba803bb461f22847768e
-
SHA512
f993afb6aea5b75cec1dda46a5de6a3e0a86046287f090e37c10913abd74de16746c5df5c28c594600f670d5f3319de879a18305532cb745f119b2b690fc7f5c
-
SSDEEP
12288:gfw5jx97iTFHwZ4R4ymmF3Z4mxxwV1quiY3+tK4TTxd:35jP7UGE4KQmXwMYY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4496 System -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\system\System 19b3f52c0ada0bd2bee71d7744b3c9c1.exe File opened for modification C:\Windows\system\System 19b3f52c0ada0bd2bee71d7744b3c9c1.exe File created C:\Windows\Delete.bat 19b3f52c0ada0bd2bee71d7744b3c9c1.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" System Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ System Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" System Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" System Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" System -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4496 System -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2740 wrote to memory of 4664 2740 19b3f52c0ada0bd2bee71d7744b3c9c1.exe 93 PID 2740 wrote to memory of 4664 2740 19b3f52c0ada0bd2bee71d7744b3c9c1.exe 93 PID 2740 wrote to memory of 4664 2740 19b3f52c0ada0bd2bee71d7744b3c9c1.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\19b3f52c0ada0bd2bee71d7744b3c9c1.exe"C:\Users\Admin\AppData\Local\Temp\19b3f52c0ada0bd2bee71d7744b3c9c1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat2⤵PID:4664
-
-
C:\Windows\system\SystemC:\Windows\system\System1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
PID:4496
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD5594efc25e6bddd08f26a4206d1e76a1b
SHA1ed6d65089611541da75572a4ea50ed131c42c89c
SHA256090ad02e606ec380f42cf3889f6cc48e50773027abcb4d5241878b2dc39c017d
SHA51254b9189c0ef151e014aea2bb5ca5e2c3af33b9c82e068aa9aee8d5935e0e9e2b7122922ba3df7a7acf2936adb89dd636696803c3fe9a6752275c6c70b8b724f4
-
Filesize
216KB
MD51b42cc23adf723b86f1edf7b381d0707
SHA153facfab5cbb0e837fd7985bf073583453d752db
SHA2569a15093bc55d7f3ab19830642514a51e37aa4486c2a16a5f5d4aceff4e54f5d5
SHA512cff593fbb0fd43f10d732164883321d3377de4b35899ddb4a407d2d5cfae0564c693cebee8469aadf48daf77eaa20671546b7978e56c92adb8d003924d4930d5
-
Filesize
242KB
MD555126462a04be1eede87ccf11d7bdf29
SHA1cde075773ab85b0b16d3a8317be3d92e882db129
SHA256f95aa923c9b56e6761464e7b8993adb127a0652289758fc641077b132dce5270
SHA512eed763af162d8d59145c9e75a415379d97d63929563f9a4d73350c5d1961519984a690e9c97f86b28585a7e80e99b7df6314869e79506f2c9b315cf57aeee4c2