Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
36a27302a361c6269c365d593f5d1a25.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
36a27302a361c6269c365d593f5d1a25.exe
Resource
win10v2004-20231215-en
General
-
Target
36a27302a361c6269c365d593f5d1a25.exe
-
Size
1.5MB
-
MD5
36a27302a361c6269c365d593f5d1a25
-
SHA1
e22c8ccc17d48620e8d3e3048b7f810cab52ff50
-
SHA256
e35fb3520d41420f5a82d2929bc973b218bc4b9be041f43b502b950da718299e
-
SHA512
98d704fce3259018b72597ffca331313f707d9765e534119c113c3306f40c58698965f163ff57f8a3f03231322eb02ef0f87d4fb1c26c2be4aef96869bc8bf22
-
SSDEEP
6144:sFEqTQwNaSfBF58TQ8GYrmjyoAXjiU4bz:u0wNaSf6cXMoAX+U4
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 36a27302a361c6269c365d593f5d1a25.exe File opened (read-only) \??\K: 36a27302a361c6269c365d593f5d1a25.exe File opened (read-only) \??\G: 36a27302a361c6269c365d593f5d1a25.exe File opened (read-only) \??\H: 36a27302a361c6269c365d593f5d1a25.exe File opened (read-only) \??\L: 36a27302a361c6269c365d593f5d1a25.exe File opened (read-only) \??\M: 36a27302a361c6269c365d593f5d1a25.exe File opened (read-only) \??\N: 36a27302a361c6269c365d593f5d1a25.exe File opened (read-only) \??\O: 36a27302a361c6269c365d593f5d1a25.exe File opened (read-only) \??\E: 36a27302a361c6269c365d593f5d1a25.exe File opened (read-only) \??\J: 36a27302a361c6269c365d593f5d1a25.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" 36a27302a361c6269c365d593f5d1a25.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\chrome.exe 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.cab 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.cab 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF70.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.cab 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Google\Chrome\Application\chrome.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF59.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF5A.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF6C.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCXF83.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\7-Zip\RCXEF2.tmp 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF56.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF58.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF5B.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF71.tmp 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\readme.1xt 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.cab 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF57.tmp 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCXF85.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\7-Zip\RCXEF0.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\7-Zip\7zFM.cab 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCXF84.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\RCXF24.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\RCXF25.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\RCXF26.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\7-Zip\7z.exe 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.cab 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.cab 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\7-Zip\7z.exe 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF72.tmp 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\7-Zip\7zFM.cab 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\7-Zip\7zFM.exe 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\DVD Maker\DVDMaker.exe 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\7-Zip\RCXF03.tmp 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.cab 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mip.cab 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\DVD Maker\DVDMaker.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXF55.tmp 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\7-Zip\RCXF02.tmp 36a27302a361c6269c365d593f5d1a25.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.cab 36a27302a361c6269c365d593f5d1a25.exe File opened for modification C:\Program Files\7-Zip\RCXEF1.tmp 36a27302a361c6269c365d593f5d1a25.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\readme.1xt 36a27302a361c6269c365d593f5d1a25.exe File created C:\windows\WallPapers.jpg 36a27302a361c6269c365d593f5d1a25.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 816 2372 WerFault.exe 14 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Desktop\General 36a27302a361c6269c365d593f5d1a25.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Desktop\General\WallpaperSource = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" 36a27302a361c6269c365d593f5d1a25.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 816 2372 36a27302a361c6269c365d593f5d1a25.exe 28 PID 2372 wrote to memory of 816 2372 36a27302a361c6269c365d593f5d1a25.exe 28 PID 2372 wrote to memory of 816 2372 36a27302a361c6269c365d593f5d1a25.exe 28 PID 2372 wrote to memory of 816 2372 36a27302a361c6269c365d593f5d1a25.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\36a27302a361c6269c365d593f5d1a25.exe"C:\Users\Admin\AppData\Local\Temp\36a27302a361c6269c365d593f5d1a25.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 10522⤵
- Program crash
PID:816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5004a039b62a7fd07d73ff3c5ae702811
SHA19dae66e7e0a283a9cd6eec5a6fa4d1abf4b1edbf
SHA256b6d296aafe29dfc4d2f1557e6b60b043ba6b086283609c0d51babd320ae30b02
SHA5125f25665ccafa15028dd45dcee5eca3ad1110faa02807a4817b856e6ffdf502394102c18a78cfe8c977b7d2ddfcd8adb853276bdac3ea818cfc18eb10066b322f
-
Filesize
1KB
MD533041a376532de90cdd4ea6a7553502d
SHA1e22e01876aface34276cb8dcebc5a774d0f4178a
SHA256088b3b76ef8fd93007b924cfaa04a15429bccad949cd9e8b2b22826418a500db
SHA5128772506c40583446539a757c30a0cfaf1bab43ccaa31377f1a534cd53eec007cb21d233da36f7d8111d23eff9c413aa13e469ae82879bb40b84e18f896c60362
-
Filesize
5KB
MD53e52ff599097fd39da1036911336ac60
SHA10df2d661eb55a6cce18cbb877b031ff06e2dc562
SHA256e1147146ffa9f2064bb796196d68a141e086a22f11b2144902fa900da708f1e5
SHA512d6971cdcc3bd94321308fd53416798b93eb22e631f143f3feef0f73017790fac12a3c42f55b6384335ea12be2570400ec688cc1968652ae78548c85e7ed6b0ab
-
Filesize
41KB
MD5c00ec288a66f8c3deca319d6a160dddf
SHA1254a24adf0c1556041efaeab87b3d909921cf494
SHA256ac0f9c51a776f68530a7734cf4b9358033fa1277fce0ec1290ab7bb2d6342512
SHA512c6aa217c45df0ba9be25c47095b7802baeb4608a3425e5c6d8a1546369e3c397d11e89095150c71e6131e88a06d422f0982327e7bfb422cad8ce7e226d87e039
-
Filesize
1KB
MD5695b6889fb43626648986703543e608c
SHA1c5296358dfac63bbf0072b37407f7af703612b6f
SHA25601c9fff20d315dcb00d7c43c04292f3b0aec39d3dbd0506eed2a1d96140528e9
SHA512682926d9653de4eb452180889bd9805d471e94d48c712ac7a79b910fd637d94462484ef766893afd6a94f6cd6294dde1afbd667b8ed62fdfec8718cffdecfffa
-
Filesize
37KB
MD510bb46b373bc7ce70b105861cb9dc1a4
SHA1608415cfcbc66d7b97f9564535991f27ade4a62d
SHA2561b6e2ddf46119910a6af04c8258016b4b22a0d552f2bd437277eb7dacf4aa0db
SHA51241cbbf5404e9a92675987418e80d4f02c150c23f6f0ce4ad2f1f2b0b5dea596a0a45359a8e4c341311940d795361c7c3b3be9bceba502e32a0607e5ace879258
-
Filesize
5KB
MD58e1398d936193c759f539b0f2a3485c9
SHA1fe260caab2885f63206d603d92dac7812a8bd190
SHA25639e5619e6c41eed61a8f6296742964f52a4577acfc3a9d3be37d229fc004e32c
SHA512abd0760103a16d5ec54dd4fd8f586fedb484bb43c045d0b2220b70b540569aa5d7cc48c41bb1ce6e4be0fbb5e2fb6f828e25331900916a9e22d980756d827b43
-
Filesize
17KB
MD546a62f3c8264ce09f8405f0d3700b445
SHA1ed3b38269b41f00dc0c9447115a7395f64e0108b
SHA256c90e8e7bddc4cb943e46ebfd562aa5681ab759040edee0490c80a8871a985404
SHA51221368c098f495617986c7698fada985cbe1010b0b95df422026963f19d88b5831563984a26b3b1b49df8f37a1198182120743b819f995846ed5d94906e94b811