Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
256e6e5b3d613931aa7156237260b96d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
256e6e5b3d613931aa7156237260b96d.exe
Resource
win10v2004-20231222-en
General
-
Target
256e6e5b3d613931aa7156237260b96d.exe
-
Size
1.1MB
-
MD5
256e6e5b3d613931aa7156237260b96d
-
SHA1
32477dd0f2042f59f5c9cedfe37a0fd2cacd63cb
-
SHA256
81761ffe90b8673e791f6f5ed7d3900c4f986515e740fdcd33f873421d01848d
-
SHA512
a5f93b3f8bd7c6229bd1cf965b53eb4db24a2bdd335b99501a17a4fef08a2726535910693520279142f2fc7a4f11e9af01b5b36c9451db82d440b18607b48dc1
-
SSDEEP
24576:fnV1I1svSIlrHQR1zdzv6hDo3CoBZ6wg4jse2jPBMT:8s6IlQRpdT6xo3CoP6wg4js5jPBs
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2352 AGE6PR5.EXE 2796 BASE.EXE 2972 BASE.EXE -
Loads dropped DLL 7 IoCs
pid Process 1112 256e6e5b3d613931aa7156237260b96d.exe 2352 AGE6PR5.EXE 2352 AGE6PR5.EXE 2352 AGE6PR5.EXE 1112 256e6e5b3d613931aa7156237260b96d.exe 1112 256e6e5b3d613931aa7156237260b96d.exe 2796 BASE.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2796 set thread context of 2972 2796 BASE.EXE 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main AGE6PR5.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2352 AGE6PR5.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2352 AGE6PR5.EXE 2352 AGE6PR5.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1112 wrote to memory of 2352 1112 256e6e5b3d613931aa7156237260b96d.exe 28 PID 1112 wrote to memory of 2352 1112 256e6e5b3d613931aa7156237260b96d.exe 28 PID 1112 wrote to memory of 2352 1112 256e6e5b3d613931aa7156237260b96d.exe 28 PID 1112 wrote to memory of 2352 1112 256e6e5b3d613931aa7156237260b96d.exe 28 PID 1112 wrote to memory of 2352 1112 256e6e5b3d613931aa7156237260b96d.exe 28 PID 1112 wrote to memory of 2352 1112 256e6e5b3d613931aa7156237260b96d.exe 28 PID 1112 wrote to memory of 2352 1112 256e6e5b3d613931aa7156237260b96d.exe 28 PID 1112 wrote to memory of 2796 1112 256e6e5b3d613931aa7156237260b96d.exe 29 PID 1112 wrote to memory of 2796 1112 256e6e5b3d613931aa7156237260b96d.exe 29 PID 1112 wrote to memory of 2796 1112 256e6e5b3d613931aa7156237260b96d.exe 29 PID 1112 wrote to memory of 2796 1112 256e6e5b3d613931aa7156237260b96d.exe 29 PID 2796 wrote to memory of 2972 2796 BASE.EXE 30 PID 2796 wrote to memory of 2972 2796 BASE.EXE 30 PID 2796 wrote to memory of 2972 2796 BASE.EXE 30 PID 2796 wrote to memory of 2972 2796 BASE.EXE 30 PID 2796 wrote to memory of 2972 2796 BASE.EXE 30 PID 2796 wrote to memory of 2972 2796 BASE.EXE 30 PID 2796 wrote to memory of 2972 2796 BASE.EXE 30 PID 2796 wrote to memory of 2972 2796 BASE.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\256e6e5b3d613931aa7156237260b96d.exe"C:\Users\Admin\AppData\Local\Temp\256e6e5b3d613931aa7156237260b96d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\AGE6PR5.EXE"C:\Users\Admin\AppData\Local\Temp\AGE6PR5.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\BASE.EXE"C:\Users\Admin\AppData\Local\Temp\BASE.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\BASE.EXE"C:\Users\Admin\AppData\Local\Temp\BASE.EXE"3⤵
- Executes dropped EXE
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD55828f6bd19748b7652f37437f6c6f90f
SHA1fcb46d4676f2d736a0ac1c985d839d62721047e9
SHA256bb34cc7f73b32a5306c4a2957212ac8ebd467712ce2d32226f283601f90755bf
SHA5124cdc373a1ab782aedf9d9408da71f300ce710e38cdc9f34a10ec92a5073cd3cb591fc1c89b50c8bf01a84db295c90ded1389b59adc1161c3fefec2d1998e5207
-
Filesize
23KB
MD540b1bc83fa5bae38d02e10a3d04cbbf0
SHA1acd9b38d44f2da8e6492941ccab129c63f8dbb80
SHA256bac1894038ec278b996c66479394a34d51cec1f50765860f558a233639322f41
SHA512bc5c1422589462d0eae68b12cb7804987b7299237f96abb6a39b5137ae37fca7efc83d785d233d80014816111501d863f26042a409cedd88042e40425915c9d4