Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 12:54
Static task
static1
Behavioral task
behavioral1
Sample
36dd91eaf5035248224a3aadf77b7b5e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36dd91eaf5035248224a3aadf77b7b5e.exe
Resource
win10v2004-20231215-en
General
-
Target
36dd91eaf5035248224a3aadf77b7b5e.exe
-
Size
1.1MB
-
MD5
36dd91eaf5035248224a3aadf77b7b5e
-
SHA1
d12fa01b8e4546c933915d9d20a19e9dff71df24
-
SHA256
13710119f066b30e07392c1f2c38e0883b7f93a05e4692387df97fc215ab00ec
-
SHA512
2c2dba00c3cbf6f826ecc8aab3b78d3ef1f55b13b78eaa7ecf29086f4551eb803afaeaeaa5895847f2f8bbe86a9bed75a74ad4f3d60b8ab14165c71dce3b21eb
-
SSDEEP
24576:qWvknOMEfAqeeoUZIfqfRWWR06wDUqzuhiBxyYW1uAhcu:qUeOMm3oUZ7Wa06wDdueQYgL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4236 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4236 4784 36dd91eaf5035248224a3aadf77b7b5e.exe 32 PID 4784 wrote to memory of 4236 4784 36dd91eaf5035248224a3aadf77b7b5e.exe 32 PID 4784 wrote to memory of 4236 4784 36dd91eaf5035248224a3aadf77b7b5e.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\36dd91eaf5035248224a3aadf77b7b5e.exe"C:\Users\Admin\AppData\Local\Temp\36dd91eaf5035248224a3aadf77b7b5e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\a2lhu0b9WW\yhdCAjKg\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2lhu0b9WW\yhdCAjKg\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:4236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5c9e6acca879b908201971550695ce04d
SHA11933d4532c70aefb165b30cecfeba50098b44908
SHA256558df017c0232d0eac7956eea0da89891d96fb0169880cab2e5c2747172338a5
SHA51265aa1f7585c04eb1e5496f8226ed93fda5c93c087d43509d7b69de4b8a8e297fd864d0c0eb72665a8a3b8821f076df43f542400b032e6593ff6a2c59a3d4b215
-
Filesize
129KB
MD5e60d723e96a5e890c8486a3934f272b4
SHA1cc99a11e4adf63a557ce610f843db1a2fdea8201
SHA256251129fb78f8eea271f323691ed5a93cc012f5af921084cc583f62a5295fdb5e
SHA512ff9cb00b4e552ed61b516702208791b7cc8f5fec1035297fb7396e40562fa1d6576c5788bd3c265548905c4ff24e1932ffb1c63d66a96f76a8e5b8fb5a51ebf2