Analysis
-
max time kernel
24s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 21:20
Static task
static1
Behavioral task
behavioral1
Sample
1ccac71be2c3bfba57da85da3bb2556a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ccac71be2c3bfba57da85da3bb2556a.exe
Resource
win10v2004-20231215-en
General
-
Target
1ccac71be2c3bfba57da85da3bb2556a.exe
-
Size
1.7MB
-
MD5
1ccac71be2c3bfba57da85da3bb2556a
-
SHA1
a264a0133291894122ee6cd7d7e09cfe546cecfe
-
SHA256
e5a02248c236c1eac1e2199280c2e34abbb31dcd329802dcef02eb7c69d549df
-
SHA512
f436cca2bb9a1a5b51851c7959b2d791267462562ab8276385980a88088e2e298b638195abaaa3d6d09a41bd41446e3756a6950dc197fd1fbbc28aebcfc12bb0
-
SSDEEP
49152:DgmI+j/fumzhTIzvxnL8OjVvX7+zNstcn+9:YFmzhTAVfp69+9
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe 1ccac71be2c3bfba57da85da3bb2556a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe 1ccac71be2c3bfba57da85da3bb2556a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\Debugger = "iesafemode.exe -sb" 1ccac71be2c3bfba57da85da3bb2556a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safari.exe 1ccac71be2c3bfba57da85da3bb2556a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safari.exe\Debugger = "iesafemode.exe -sb" 1ccac71be2c3bfba57da85da3bb2556a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe 1ccac71be2c3bfba57da85da3bb2556a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe\Debugger = "iesafemode.exe -sb" 1ccac71be2c3bfba57da85da3bb2556a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe\Debugger = "iesafemode.exe -sb" 1ccac71be2c3bfba57da85da3bb2556a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\Debugger = "iesafemode.exe -sb" 1ccac71be2c3bfba57da85da3bb2556a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe 1ccac71be2c3bfba57da85da3bb2556a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVG Antivirus 2011 = "C:\\Program Files (x86)\\AVG Antivirus 2011\\avg.exe" 1ccac71be2c3bfba57da85da3bb2556a.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\L: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\O: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\Q: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\Z: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\N: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\S: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\U: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\X: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\Y: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\E: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\T: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\P: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\R: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\V: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\H: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\I: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\J: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\K: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\M: 1ccac71be2c3bfba57da85da3bb2556a.exe File opened (read-only) \??\W: 1ccac71be2c3bfba57da85da3bb2556a.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\iesafemode.exe 1ccac71be2c3bfba57da85da3bb2556a.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\AVG Antivirus 2011\avg.exe 1ccac71be2c3bfba57da85da3bb2556a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\Desktop\ForegroundLockTimeout = "0" 1ccac71be2c3bfba57da85da3bb2556a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Compatibility Flags = "1024" 1ccac71be2c3bfba57da85da3bb2556a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000} 1ccac71be2c3bfba57da85da3bb2556a.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4816 1ccac71be2c3bfba57da85da3bb2556a.exe 4816 1ccac71be2c3bfba57da85da3bb2556a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4816 1ccac71be2c3bfba57da85da3bb2556a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ccac71be2c3bfba57da85da3bb2556a.exe"C:\Users\Admin\AppData\Local\Temp\1ccac71be2c3bfba57da85da3bb2556a.exe"1⤵
- Sets file execution options in registry
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4816