Analysis

  • max time kernel
    2s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 02:06

General

  • Target

    23e2181e05ce798a1cc2dd71f66cff35.exe

  • Size

    294KB

  • MD5

    23e2181e05ce798a1cc2dd71f66cff35

  • SHA1

    862fba227199b6e5c12c66ba8bdf936809bfe264

  • SHA256

    dde83db76569766ad9f6f186879043576f1e786c3e18ecae1d22c8effc225a8a

  • SHA512

    7eea30256c537cf4e2eed47d00b249f79340bc43f71e595334d6f844b326cc290fb9f8e84cbdc99a5962a7b6a5585003e97d71a0785fba7830a3eadeb8fbd461

  • SSDEEP

    6144:gMP8EXghIh5hg3Dh8f+M5eIn4Zks/1bDYQ7ZdaOYAFH3px02hmbL:gMUCghIjhk3Bq3s/1ZWOjRhmbL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23e2181e05ce798a1cc2dd71f66cff35.exe
    "C:\Users\Admin\AppData\Local\Temp\23e2181e05ce798a1cc2dd71f66cff35.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\SysWOW64\regedit.exe
      regedit.exe /s "C:\Users\Admin\AppData\Local\Temp\\\15.ini"
      2⤵
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Runs regedit.exe
      PID:2704
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun93.bat" "
      2⤵
        PID:2244
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun57.bat" "
        2⤵
          PID:2800
      • C:\Windows\SysWOW64\cacls.exe
        cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\╞⌠╢» Internet Explorer Σ»└└╞≈.lnk" /G Everyone:R /C
        1⤵
          PID:2700
        • C:\Windows\SysWOW64\cacls.exe
          cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
          1⤵
            PID:2084
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            1⤵
              PID:2888
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              1⤵
                PID:2592

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1988-0-0x0000000000230000-0x0000000000231000-memory.dmp

                Filesize

                4KB

              • memory/1988-36-0x0000000000400000-0x00000000004C9000-memory.dmp

                Filesize

                804KB