Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
2b0ed275cadb2755f470a82a57a0cda9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b0ed275cadb2755f470a82a57a0cda9.exe
Resource
win10v2004-20231215-en
General
-
Target
2b0ed275cadb2755f470a82a57a0cda9.exe
-
Size
14KB
-
MD5
2b0ed275cadb2755f470a82a57a0cda9
-
SHA1
3d259dcb648621ad816979f62e552c21b5bce2f7
-
SHA256
573990441bbafc2e25847db70dc53c595aad061da4f684c71b33e4d3778b02e3
-
SHA512
79f72d1485e8b42d6ebdf31815bfa67ebc6f4393a444de7d56edaf380d92f81deed4c33a905157b7d4dbbee0ac23b833d563f72b2430b3d94554f3fbff00bebe
-
SSDEEP
384:88IPo7WiuU5adrEXgBswGVSGo44Q2KQGwOYekIYPmady2dWGmB8AB:88IPouU4SwSBVSG9gpISlyNG2
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\dispexcb.dll = "{76D44356-B494-443a-BEDC-AA68DE4255E6}" 2b0ed275cadb2755f470a82a57a0cda9.exe -
Loads dropped DLL 1 IoCs
pid Process 1156 2b0ed275cadb2755f470a82a57a0cda9.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dispexcb.nls 2b0ed275cadb2755f470a82a57a0cda9.exe File created C:\Windows\SysWOW64\dispexcb.tmp 2b0ed275cadb2755f470a82a57a0cda9.exe File opened for modification C:\Windows\SysWOW64\dispexcb.tmp 2b0ed275cadb2755f470a82a57a0cda9.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6}\InProcServer32\ThreadingModel = "Apartment" 2b0ed275cadb2755f470a82a57a0cda9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6} 2b0ed275cadb2755f470a82a57a0cda9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6}\InProcServer32 2b0ed275cadb2755f470a82a57a0cda9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6}\InProcServer32\ = "C:\\Windows\\SysWow64\\dispexcb.dll" 2b0ed275cadb2755f470a82a57a0cda9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1156 2b0ed275cadb2755f470a82a57a0cda9.exe 1156 2b0ed275cadb2755f470a82a57a0cda9.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1156 2b0ed275cadb2755f470a82a57a0cda9.exe 1156 2b0ed275cadb2755f470a82a57a0cda9.exe 1156 2b0ed275cadb2755f470a82a57a0cda9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1156 wrote to memory of 3956 1156 2b0ed275cadb2755f470a82a57a0cda9.exe 99 PID 1156 wrote to memory of 3956 1156 2b0ed275cadb2755f470a82a57a0cda9.exe 99 PID 1156 wrote to memory of 3956 1156 2b0ed275cadb2755f470a82a57a0cda9.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b0ed275cadb2755f470a82a57a0cda9.exe"C:\Users\Admin\AppData\Local\Temp\2b0ed275cadb2755f470a82a57a0cda9.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\BF68.tmp.bat2⤵PID:3956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD59f30bdfe5dad289bf6cd4d594dedb251
SHA1c463df964de84e76c905ad5360382467e018a762
SHA25682abc6afaa9867d06f9c00b6f81337118453392777f283d22ea6ee3e99808677
SHA512883ce2e31575cf4b699859060ff505079446855524983994064b66b9f402b9ecefaf5aa93073ed85b0da9eaccdf3ccf437ec0aeaec42df064a0fbd065198f6d5
-
Filesize
2.4MB
MD54e23f0f1d21a1e6249c12c901b1bf305
SHA1b9aa358fd62cecab68fcb219f1867e14623b8581
SHA256938c7524a175c86ee3a33573ef95c038bfa912219fa57dd5013c75f65f2cc9a6
SHA5124233b906bc538d8311f6dae5de8578a9ae60e3374079651f84affe658e4c7514b9258a35e2dea529d48835ea89ddc08a01deda548d9c1a4ba44a7c912fa44470
-
Filesize
2.3MB
MD5dd4a3764dc4f76f9d37dcfc05cbb5c58
SHA16c66d5490f438ca86ebee1706624fbf62d0f599f
SHA25657a29b5f6c47b90610b82952ccb40156be69207cdd250fbff0c4debb9b5cc603
SHA512e40c05b82a85c0148fd0810d3ea8456eca6a2d6d24559492ac8643e01377fff13ba087088099d7e6f187f721237020d3e520ee8d6e346649eca5124cfb925ef0