Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:29
Static task
static1
Behavioral task
behavioral1
Sample
380b05c750732bd4c0887d90c684b5de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
380b05c750732bd4c0887d90c684b5de.exe
Resource
win10v2004-20231215-en
General
-
Target
380b05c750732bd4c0887d90c684b5de.exe
-
Size
45KB
-
MD5
380b05c750732bd4c0887d90c684b5de
-
SHA1
1be814a2f68acf74e6d716e2b4a87be870ee1e5e
-
SHA256
3d55b037cd4d9041de0e54b74c146c698d185c124fad6a889309ce0878ddfc1d
-
SHA512
b2a6a1252a52a0992d67a8b34e267196507ff0c78599cf6bfc759fb187f4e510eb17b098c92da22d4760f6e9814008702c54ddb255da0779fd0aafd3fd49b0bb
-
SSDEEP
768:gdcI0SjL+ejzE7z/hcwFlrGGIaxuNplzTNCjKY50x:jSjLzE/fFlqNplzTNcjY
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\WebProxy = "{A744F16C-B2D5-4138-81A2-085CDFCDE83A}" 380b05c750732bd4c0887d90c684b5de.exe -
Modifies Installed Components in the registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\Locale = "EN" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\StubPath = "rundll32 sxmg4.dll,InitModule" 380b05c750732bd4c0887d90c684b5de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\IsInstalled = "1" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\Version = "1,0,0,2" 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A} 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\ = "Systray component" 380b05c750732bd4c0887d90c684b5de.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a000000012243-3.dat acprotect -
Deletes itself 1 IoCs
pid Process 1200 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2848 regsvr32.exe -
resource yara_rule behavioral1/files/0x000a000000012243-3.dat upx behavioral1/memory/2848-5-0x0000000010000000-0x0000000010019000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{32C620D6-CC10-4e6a-9715-BACACD5B0E61} 380b05c750732bd4c0887d90c684b5de.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sxmg4.dll 380b05c750732bd4c0887d90c684b5de.exe File created C:\Windows\SysWOW64\sft.res 380b05c750732bd4c0887d90c684b5de.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\index.html 380b05c750732bd4c0887d90c684b5de.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 380b05c750732bd4c0887d90c684b5de.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" 380b05c750732bd4c0887d90c684b5de.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61} 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\ = "Microsoft copyright" 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A744F16C-B2D5-4138-81A2-085CDFCDE83A} 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\InprocServer32 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\InprocServer32\ThreadingModel = "Apartment" 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\ProgID 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\ProgID\ = "MS" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\TypeLib\ = "{C8691316-2034-4350-9A66-6AE2FD9EE257}" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\InProcServer32\ = "sxmg4.dll" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\InprocServer32\ = "sxmg4.dll" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\ = "WebProxy" 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\InProcServer32 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\InProcServer32\ThreadingModel = "Apartment" 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\TypeLib 380b05c750732bd4c0887d90c684b5de.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2848 2900 380b05c750732bd4c0887d90c684b5de.exe 28 PID 2900 wrote to memory of 2848 2900 380b05c750732bd4c0887d90c684b5de.exe 28 PID 2900 wrote to memory of 2848 2900 380b05c750732bd4c0887d90c684b5de.exe 28 PID 2900 wrote to memory of 2848 2900 380b05c750732bd4c0887d90c684b5de.exe 28 PID 2900 wrote to memory of 2848 2900 380b05c750732bd4c0887d90c684b5de.exe 28 PID 2900 wrote to memory of 2848 2900 380b05c750732bd4c0887d90c684b5de.exe 28 PID 2900 wrote to memory of 2848 2900 380b05c750732bd4c0887d90c684b5de.exe 28 PID 2900 wrote to memory of 1200 2900 380b05c750732bd4c0887d90c684b5de.exe 29 PID 2900 wrote to memory of 1200 2900 380b05c750732bd4c0887d90c684b5de.exe 29 PID 2900 wrote to memory of 1200 2900 380b05c750732bd4c0887d90c684b5de.exe 29 PID 2900 wrote to memory of 1200 2900 380b05c750732bd4c0887d90c684b5de.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\380b05c750732bd4c0887d90c684b5de.exe"C:\Users\Admin\AppData\Local\Temp\380b05c750732bd4c0887d90c684b5de.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies Installed Components in the registry
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s sxmg4.dll2⤵
- Loads dropped DLL
PID:2848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\380B05~1.EXE >> NUL2⤵
- Deletes itself
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD54bfbf5537b57a1258aabfb4e1bd3b01c
SHA1f2cd1422a3c11d640b6947ae6ae6e83419acfae8
SHA25619a2d37047036a4b1414d29c6055a9ab33fc8ca6033e64213191fbcd8d68beaa
SHA512b3831d86687185ee2ceda7b5496d86e00fee865cdae06088ccc9c9c050ebfea6adfd69d0c2db4c8ef3c9c7480eeadb00ae67d25e889a1430ccbb3be0b5f01e62