Analysis
-
max time kernel
0s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
380b05c750732bd4c0887d90c684b5de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
380b05c750732bd4c0887d90c684b5de.exe
Resource
win10v2004-20231215-en
General
-
Target
380b05c750732bd4c0887d90c684b5de.exe
-
Size
45KB
-
MD5
380b05c750732bd4c0887d90c684b5de
-
SHA1
1be814a2f68acf74e6d716e2b4a87be870ee1e5e
-
SHA256
3d55b037cd4d9041de0e54b74c146c698d185c124fad6a889309ce0878ddfc1d
-
SHA512
b2a6a1252a52a0992d67a8b34e267196507ff0c78599cf6bfc759fb187f4e510eb17b098c92da22d4760f6e9814008702c54ddb255da0779fd0aafd3fd49b0bb
-
SSDEEP
768:gdcI0SjL+ejzE7z/hcwFlrGGIaxuNplzTNCjKY50x:jSjLzE/fFlqNplzTNcjY
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\WebProxy = "{A744F16C-B2D5-4138-81A2-085CDFCDE83A}" 380b05c750732bd4c0887d90c684b5de.exe -
Modifies Installed Components in the registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\Version = "1,0,0,2" 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A} 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\ = "Systray component" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\Locale = "EN" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\StubPath = "rundll32 sxmg4.dll,InitModule" 380b05c750732bd4c0887d90c684b5de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\IsInstalled = "1" 380b05c750732bd4c0887d90c684b5de.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000300000001e982-4.dat acprotect behavioral2/files/0x000300000001e982-3.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 380b05c750732bd4c0887d90c684b5de.exe -
resource yara_rule behavioral2/memory/4624-5-0x0000000010000000-0x0000000010019000-memory.dmp upx behavioral2/files/0x000300000001e982-4.dat upx behavioral2/files/0x000300000001e982-3.dat upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{32C620D6-CC10-4e6a-9715-BACACD5B0E61} 380b05c750732bd4c0887d90c684b5de.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sxmg4.dll 380b05c750732bd4c0887d90c684b5de.exe File created C:\Windows\SysWOW64\sft.res 380b05c750732bd4c0887d90c684b5de.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\index.html 380b05c750732bd4c0887d90c684b5de.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\ProgID 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\InProcServer32 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61} 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\ = "Microsoft copyright" 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\InprocServer32 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\TypeLib 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\TypeLib\ = "{C8691316-2034-4350-9A66-6AE2FD9EE257}" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\InprocServer32\ = "sxmg4.dll" 380b05c750732bd4c0887d90c684b5de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A744F16C-B2D5-4138-81A2-085CDFCDE83A} 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\InprocServer32\ThreadingModel = "Apartment" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32C620D6-CC10-4e6a-9715-BACACD5B0E61}\ProgID\ = "MS" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\ = "WebProxy" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\InProcServer32\ = "sxmg4.dll" 380b05c750732bd4c0887d90c684b5de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A744F16C-B2D5-4138-81A2-085CDFCDE83A}\InProcServer32\ThreadingModel = "Apartment" 380b05c750732bd4c0887d90c684b5de.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1480 wrote to memory of 4624 1480 380b05c750732bd4c0887d90c684b5de.exe 28 PID 1480 wrote to memory of 4624 1480 380b05c750732bd4c0887d90c684b5de.exe 28 PID 1480 wrote to memory of 4624 1480 380b05c750732bd4c0887d90c684b5de.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\380b05c750732bd4c0887d90c684b5de.exe"C:\Users\Admin\AppData\Local\Temp\380b05c750732bd4c0887d90c684b5de.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies Installed Components in the registry
- Checks computer location settings
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\380B05~1.EXE >> NUL2⤵PID:3588
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s sxmg4.dll2⤵PID:4624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5da75366ea6738c6363c9381ee49d16f8
SHA134bb8566ca0c18587d1c841d872774af27fc2f97
SHA2568779969cf9ca7ed3ba3ef5568c44d5110403fb9d0eca45525486faf253e924a5
SHA512810475ba53c8b076806745ca5b6cc10d78eb32120852ce4b97faf47581e9d0ca8f422a86bc57d1f344717877daaa83bcf54b1bbc279e315e770edcb0c05293fb
-
Filesize
24KB
MD5283d1021ecab1236f6c063d04d65bb45
SHA1e902bf782b764528890f3bd2e3deeac6f3401601
SHA2562b0469e0f2b196882e68278949ea325a7783229aeae47e9fa712d629cfdfe13d
SHA5125c9e88677ad04cc1663c1de128b5d78ee6614b050479a3dd07f6d3f1984f3ade344f8680a214ad7849827e887fb92d3e2401d4485100e4346cc8278d18a997a9