Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 12:54
Static task
static1
Behavioral task
behavioral1
Sample
36dd91eaf5035248224a3aadf77b7b5e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36dd91eaf5035248224a3aadf77b7b5e.exe
Resource
win10v2004-20231215-en
General
-
Target
36dd91eaf5035248224a3aadf77b7b5e.exe
-
Size
1.1MB
-
MD5
36dd91eaf5035248224a3aadf77b7b5e
-
SHA1
d12fa01b8e4546c933915d9d20a19e9dff71df24
-
SHA256
13710119f066b30e07392c1f2c38e0883b7f93a05e4692387df97fc215ab00ec
-
SHA512
2c2dba00c3cbf6f826ecc8aab3b78d3ef1f55b13b78eaa7ecf29086f4551eb803afaeaeaa5895847f2f8bbe86a9bed75a74ad4f3d60b8ab14165c71dce3b21eb
-
SSDEEP
24576:qWvknOMEfAqeeoUZIfqfRWWR06wDUqzuhiBxyYW1uAhcu:qUeOMm3oUZ7Wa06wDdueQYgL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2572 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 1944 36dd91eaf5035248224a3aadf77b7b5e.exe 2572 Setup.exe 2572 Setup.exe 2572 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2572 1944 36dd91eaf5035248224a3aadf77b7b5e.exe 28 PID 1944 wrote to memory of 2572 1944 36dd91eaf5035248224a3aadf77b7b5e.exe 28 PID 1944 wrote to memory of 2572 1944 36dd91eaf5035248224a3aadf77b7b5e.exe 28 PID 1944 wrote to memory of 2572 1944 36dd91eaf5035248224a3aadf77b7b5e.exe 28 PID 1944 wrote to memory of 2572 1944 36dd91eaf5035248224a3aadf77b7b5e.exe 28 PID 1944 wrote to memory of 2572 1944 36dd91eaf5035248224a3aadf77b7b5e.exe 28 PID 1944 wrote to memory of 2572 1944 36dd91eaf5035248224a3aadf77b7b5e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\36dd91eaf5035248224a3aadf77b7b5e.exe"C:\Users\Admin\AppData\Local\Temp\36dd91eaf5035248224a3aadf77b7b5e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\a2j4gRVRjt\B4RPtg1K\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2j4gRVRjt\B4RPtg1K\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5209005c86fbc2b45dcfdfb1b65086d80
SHA1a3dba57b215044523f25d1ec46217081a1460035
SHA2566f419187e8b1a576229c3a4435d81bb5caaf2ccc280506e708c1eb9289b1d4e7
SHA512d64dd2945c9022fb21431cb73766cd9e16e895b3ebfdebde870c262aa6667da734a192e5069efc6bff7cdc6650501ff34410772cfe2da45ebce768c30df44dbf
-
Filesize
67KB
MD59755844bcd510467677b5d8423acbd68
SHA10d43e02ee8a55d052a44311a9360f696626b5b52
SHA256941053f3ed45875e4d83b2449ad2db2a6b0144e10e6a1adbaf7ff24e4d07a89f
SHA5127a50e456428008ca62dd5feac6da5557cc00622acfc57481a0cc5feef01aa8a8003933f11f6935a7131ab55a5823678ea912771cdef39400e36ab46a70fba470
-
Filesize
66KB
MD53881575cd37925319c708eb1401b4051
SHA1c895079d10913242a5ebaadff0192d0723183bb6
SHA2568e4451d19b22e33967e24d901bf3fb9e48f38a0e8c968f948610731f71f6e3ed
SHA512e6487090b74311eb5c3a233fa2698a11a29833d60266820e0edfe243434aec98930c2d9a11cfe587fc4e5759364fed1205b1c33e1e4ce8657be035a51b27a781
-
Filesize
47KB
MD5d6387e597c194c9d13fee5c8c76a30b2
SHA13e717a28589bb2018ececf3fd065a46dfa7f1ae2
SHA256863f8e3588727e583eb329b5fd1cbb4e453c7a5e27994964012e0b5e04e561a2
SHA512fd0c7a6c67408cc05e0a0f2717bb75049ed555f9190c4ab960dbf886ad672b1ddb6d70f9380a0bcbd21241d5ec0517c23ed4c0cc9ec54e7fe1337128b01cfd59
-
Filesize
35KB
MD57c4dd9d3b88adeb9d785b21e8f274335
SHA195ff88eb48a3864619e9a4b427f7fbe4ae039b76
SHA256a2ce6ffdcabf237a8a9bfada4c3b8340f40cceaeeb36da81869b2b65e0e30993
SHA512f9378074faac12a9babe93ff20c1bde951f9a9c42e015c7a626b6974ea8d3dfc87348d5b213c567840534636d9cfed4d3e92bd8d861d4ba4b5a101b34ca5ac57
-
Filesize
92KB
MD55c4517c4e4e5aec3438ef2397d0b604a
SHA1133a312a2b08bd3393c9f204c826647c32878a06
SHA25666dad49ed2a9e1ebab26d941f45aaa2d74bc7b89ccce435ddd3898f16a182dca
SHA512f8e4146c8628720a97fad969a682ecd77c7461c40885d719356b8b3603788d121e637605c880e22edefed355d06f9a34878314b106575a58d7a5b7fd21820724