Analysis
-
max time kernel
2s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:06
Behavioral task
behavioral1
Sample
23e2181e05ce798a1cc2dd71f66cff35.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
23e2181e05ce798a1cc2dd71f66cff35.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
23e2181e05ce798a1cc2dd71f66cff35.exe
-
Size
294KB
-
MD5
23e2181e05ce798a1cc2dd71f66cff35
-
SHA1
862fba227199b6e5c12c66ba8bdf936809bfe264
-
SHA256
dde83db76569766ad9f6f186879043576f1e786c3e18ecae1d22c8effc225a8a
-
SHA512
7eea30256c537cf4e2eed47d00b249f79340bc43f71e595334d6f844b326cc290fb9f8e84cbdc99a5962a7b6a5585003e97d71a0785fba7830a3eadeb8fbd461
-
SSDEEP
6144:gMP8EXghIh5hg3Dh8f+M5eIn4Zks/1bDYQ7ZdaOYAFH3px02hmbL:gMUCghIjhk3Bq3s/1ZWOjRhmbL
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main 23e2181e05ce798a1cc2dd71f66cff35.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.1188.com/?23e2181e05ce798a1cc2dd71f66cff35" regedit.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 23e2181e05ce798a1cc2dd71f66cff35.exe -
Runs regedit.exe 1 IoCs
pid Process 2704 regedit.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2704 1988 23e2181e05ce798a1cc2dd71f66cff35.exe 28 PID 1988 wrote to memory of 2704 1988 23e2181e05ce798a1cc2dd71f66cff35.exe 28 PID 1988 wrote to memory of 2704 1988 23e2181e05ce798a1cc2dd71f66cff35.exe 28 PID 1988 wrote to memory of 2704 1988 23e2181e05ce798a1cc2dd71f66cff35.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23e2181e05ce798a1cc2dd71f66cff35.exe"C:\Users\Admin\AppData\Local\Temp\23e2181e05ce798a1cc2dd71f66cff35.exe"1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s "C:\Users\Admin\AppData\Local\Temp\\\15.ini"2⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Runs regedit.exe
PID:2704
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\srun93.bat" "2⤵PID:2244
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\srun57.bat" "2⤵PID:2800
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\╞⌠╢» Internet Explorer Σ»└└╞≈.lnk" /G Everyone:R /C1⤵PID:2700
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C1⤵PID:2084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"1⤵PID:2888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"1⤵PID:2592