Analysis
-
max time kernel
121s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
24bd3998edbc7549f50201cce7b9a11c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24bd3998edbc7549f50201cce7b9a11c.exe
Resource
win10v2004-20231215-en
General
-
Target
24bd3998edbc7549f50201cce7b9a11c.exe
-
Size
696KB
-
MD5
24bd3998edbc7549f50201cce7b9a11c
-
SHA1
713f191a4b99967af3c019765931a9624fdc8830
-
SHA256
1472780b22a70f13e6aec3ffd06fc9714748841f9f88c3c3b743d247d9711d68
-
SHA512
ca1adc1f5a27711442187e7032c1e1bee8d4c56313531dce2f2de817b4d3ddb31d7ed05a2ba4edba41ff1bcd30c15501a3f4468419b8179631d47fdcfe2eec03
-
SSDEEP
12288:IF9COQM7p6I76cLkjTisIessEnq9+uJ7zk+nG8R5+YIHf8pw5a4EcseV:yxrYBfhcnq3JhG8RobEpcaTi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2856 CheckVer104.exe 2876 regver.exe -
Loads dropped DLL 9 IoCs
pid Process 1888 24bd3998edbc7549f50201cce7b9a11c.exe 1888 24bd3998edbc7549f50201cce7b9a11c.exe 1888 24bd3998edbc7549f50201cce7b9a11c.exe 1888 24bd3998edbc7549f50201cce7b9a11c.exe 2856 CheckVer104.exe 2856 CheckVer104.exe 2856 CheckVer104.exe 2876 regver.exe 2876 regver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main regver.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 regver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 regver.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 regver.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 regver.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2856 CheckVer104.exe 2856 CheckVer104.exe 2876 regver.exe 2876 regver.exe 2876 regver.exe 2876 regver.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2856 1888 24bd3998edbc7549f50201cce7b9a11c.exe 29 PID 1888 wrote to memory of 2856 1888 24bd3998edbc7549f50201cce7b9a11c.exe 29 PID 1888 wrote to memory of 2856 1888 24bd3998edbc7549f50201cce7b9a11c.exe 29 PID 1888 wrote to memory of 2856 1888 24bd3998edbc7549f50201cce7b9a11c.exe 29 PID 1888 wrote to memory of 2856 1888 24bd3998edbc7549f50201cce7b9a11c.exe 29 PID 1888 wrote to memory of 2856 1888 24bd3998edbc7549f50201cce7b9a11c.exe 29 PID 1888 wrote to memory of 2856 1888 24bd3998edbc7549f50201cce7b9a11c.exe 29 PID 1888 wrote to memory of 2876 1888 24bd3998edbc7549f50201cce7b9a11c.exe 28 PID 1888 wrote to memory of 2876 1888 24bd3998edbc7549f50201cce7b9a11c.exe 28 PID 1888 wrote to memory of 2876 1888 24bd3998edbc7549f50201cce7b9a11c.exe 28 PID 1888 wrote to memory of 2876 1888 24bd3998edbc7549f50201cce7b9a11c.exe 28 PID 1888 wrote to memory of 2876 1888 24bd3998edbc7549f50201cce7b9a11c.exe 28 PID 1888 wrote to memory of 2876 1888 24bd3998edbc7549f50201cce7b9a11c.exe 28 PID 1888 wrote to memory of 2876 1888 24bd3998edbc7549f50201cce7b9a11c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\24bd3998edbc7549f50201cce7b9a11c.exe"C:\Users\Admin\AppData\Local\Temp\24bd3998edbc7549f50201cce7b9a11c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\TempImg\regver.exeC:\Users\Admin\AppData\Local\TempImg\regver.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
C:\Users\Admin\AppData\Local\TempImg\CheckVer104.exeC:\Users\Admin\AppData\Local\TempImg\CheckVer104.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD5eee29a2c7b5499cf80301539d5c26a0d
SHA1472eb0c7ce769535679137229e7a89804f5b51e9
SHA2562494de25ceaa5109deb1fae2a183f73f913f71208e2f31c3ea967b7c2f44da68
SHA512539ac941b6c63f75085b952d042be2285a65d275af5ccf486cc9062fba081ca692a367a208b9d745b053c72f84e88f49ab4c656d8813c394533b22df7da1be87
-
Filesize
68KB
MD53c6a4fca6de0f3e4e4c9e94a469b8614
SHA1188b9d662083e61883ff6da027e987a7630c1c46
SHA2565726b4d600619d7fb04524169aabef9d232a7257f3dc941cf98d1459637ca487
SHA512ede930458bb40599826f76b056b309a5f86305933de6f19bbd78c546159c6a66e6ff603567fee6ad8b7449331566cbdd2412f06c7f4dae728524448d4fd3a7fe
-
Filesize
275KB
MD5723af142594edc1841b0e69386a38eb4
SHA159374b1859fbb5b8526155b12c731b1d9df1b1ef
SHA256832a5b901e89b2fcd26e05d12014cc58c4913c7f312879c01821f3f63d6f3264
SHA512b0860fad13d8a3eb8deb10e8711437fa8437e658e0c0aef7e7a61e5ed41473876e6676d946ba944b3f40ea46d712d0ec74226b39bfc8f23cf576f068acb7341f
-
Filesize
90KB
MD592c9626e746b4f358e1f0f8073469fca
SHA1d78110f23b7c3d8f6e765667966b251825e6130f
SHA256ecf3581b37380d1a98a3db9e84fc46e3a2babc0a64a4affe0c61e765498b6038
SHA512f1416f2a66a6d7bfbf4eab610f104486ea95f1be4c8231fe22ca15ab337d22e6a9af8dc0ebbcb68b2a1bd5df61a50cdaf31538efddf8a29ee6ba37a263dbc7dc
-
Filesize
42KB
MD5776a496142c82a89a0f8e4b552e5d46e
SHA19e29072c8a6a1cc0b76fdcfc272c724a57d49cae
SHA2562c6faf5c255f381fd1db420afbf27e03fd669168dc072f25445b222152aab841
SHA512af6bffec528dd858cc98b897407ee47779fd39e84ecaa034cf3bbe8a18c7ee224c80edfbfe15e8b17b738db19d357fbc2e5a93a7e58b288eb999c41f26b2905b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
65KB
MD5f684aa00c09de654d03159e6b75339c5
SHA19a3622d63bd224bd06116e5b8b5a277399848e5f
SHA256dd3845260294efa19169c59da6edbdfcac7a8a729fff550f5f46430e62c7b2bc
SHA5120311dcfc080682412d880fd950c44a8b19e3c028a7c1a96fdcfcce51c70455cdd097dcd9b334b3b1aab6935f5ab62d09604324fec257cbeecca0792d1913bed7
-
Filesize
53KB
MD527e572aaff6110943b93cbede65fff38
SHA1d35c6e7332c55d4939ca7a016a0728614fdcbfc9
SHA25642a165715c64a2c6ff5c982b94de95ad7f3f7543818863acef6577db989c86e3
SHA51205e51554f4ebf7d35540c9f5673fd3088e0d198f168d90edc9592b02f9032cd562b6eca68c2b5918ee2cc9dc0c4c5874f0854373eefd7d536713f410b9ccc861
-
Filesize
10KB
MD5819c275859e48cfa1b2edfa174309d89
SHA103cd6b0ef1a374b0010efe30e9707be1a596d471
SHA25622c443f7317bbae74147d3f2cad72468024f5788c4574dadca848899e51e4f7d
SHA5120fac05cbd7f1f325dc60d2bb9c2c5d3f9a9d1fd0c6f564bc8f59b094da1deffec5509d544271eed63a3a3d151cfb1409ab16996a33324c9fe10a658eadefa1bc
-
Filesize
6KB
MD521968d49d35796154c981fb9288b6464
SHA117166bc250730cad380627270001c9ea7d5ac9dc
SHA256aaec97d9253f986cb4f541f6151602e2900454425146965cb19234c046abb6f5
SHA512b0fc583c60cf1dd04418fd1dd49aca5711698ab2a39bc7044c32e526782cf011e30e7d65cb8d4717e5811ab92572b9849e1ef38762625eb069bf8083d0ae6296
-
Filesize
8KB
MD522e78aea5ef3c25c6384671ec8371271
SHA1f2e7f46f5787aabdf4281e29f7a23700b9b24595
SHA2562852ca6027b69f2e3af7f7ca4a9b8dc081d3121818365ae4351128661d58bbae
SHA51261aa94b17d6cae04824a36e0dff33608cdd1ae8489acbceb39a95697877b7bca0cfd88ced6f8a44a4f805863aaeedd577f739c8b6f19c996932d38f5a9f19344
-
Filesize
42KB
MD5e177bee6974753b303c0e6705ef1ba03
SHA14e7d7aab4b78f1e6507c73c483ba92e09ff47d23
SHA2566fe6f3dc37f7d307115ce349e825cb94abaf55fbfcafa42ab6d155b78a4a7813
SHA51213ea93608c1563a3b20bfb813434b55deae684e80e45824728b639122d26960f17eec4779dd9a743429808ac722ca18b1cafe88aadb89cd42f72bac4e31ad3ba
-
Filesize
25KB
MD5cbc83752d2c3f7db55ae58748aa81746
SHA1e13b0f9dbdead94939fff44d0a7f9b48fd9f2ded
SHA2564430e95201e5582d22a715aa4d9c3d52e704f97b9ba04f0ad56bb33531903f78
SHA5123d0b1ce373ce3ad619d308090b1a06e56517c0c13d7c309784a59033d094ad4ae314d8176806c1e9857c9efc3c0f060891bdda86a5ed6e3c02879a8015f9141c
-
Filesize
26KB
MD5c21223205ecfaffe4d1efcd1a10f8ba4
SHA1fc8728ca76284e4e1a2a694dcbd76e26b7db8425
SHA256b9232aa68a548798af2baf3f06cdb325a540c9ad76332525f584a88e029bb941
SHA5128526d6c3456db592db7cb589307ef21a22d6bf187b7e43af555ca56dfed671eecf1918260aa7ff8590d9bb52c6b79d4ec7e1fae2abdd13c42fe1e5c1fc5c511c
-
Filesize
5KB
MD5a7cd6206240484c8436c66afb12bdfbf
SHA10bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919
SHA25669ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926
SHA512b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667