Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 00:38
Behavioral task
behavioral1
Sample
21fad76d98803bae440333eba41802a7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21fad76d98803bae440333eba41802a7.exe
Resource
win10v2004-20231215-en
General
-
Target
21fad76d98803bae440333eba41802a7.exe
-
Size
241KB
-
MD5
21fad76d98803bae440333eba41802a7
-
SHA1
17d63f8370a2083869f3a310d1bf29e6927f198a
-
SHA256
e9d3500b6da587e589c79ccc74ced846fdb593bd3f454c5137d55745bf3164ac
-
SHA512
834ef69b592e7cb5dbb0fb70bf6a5cfc130a0c219c1f2b0308f99f0b55c333eb09ac8fb058d6af54e07907bb3c79cb2639dde89ca328ed1d38126aa7e4a3fe8f
-
SSDEEP
6144:D2mNxzJueVpaVBHpCRDYtypqfvjSEx11Th35jo:DbLYeeHkR0type7JJ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2536-0-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2536-2-0x0000000000400000-0x00000000004AC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Program Files (x86)\\\\" 21fad76d98803bae440333eba41802a7.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 21fad76d98803bae440333eba41802a7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\NoExplorer = "1" 21fad76d98803bae440333eba41802a7.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 21fad76d98803bae440333eba41802a7.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 21fad76d98803bae440333eba41802a7.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2536 21fad76d98803bae440333eba41802a7.exe 2536 21fad76d98803bae440333eba41802a7.exe 2536 21fad76d98803bae440333eba41802a7.exe 2536 21fad76d98803bae440333eba41802a7.exe 2536 21fad76d98803bae440333eba41802a7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21fad76d98803bae440333eba41802a7.exe"C:\Users\Admin\AppData\Local\Temp\21fad76d98803bae440333eba41802a7.exe"1⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2536