Analysis
-
max time kernel
136s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 15:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a3aa6c1122cbdce486771ab2ed985cd.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a3aa6c1122cbdce486771ab2ed985cd.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
3a3aa6c1122cbdce486771ab2ed985cd.exe
-
Size
81KB
-
MD5
3a3aa6c1122cbdce486771ab2ed985cd
-
SHA1
b7ff9992da46dce39df33f5d7e985a6b0cece50d
-
SHA256
68667151c5ce91b7c874d19603f0024ea57d5e7f1b94346625e0d0ffbc86f688
-
SHA512
bdb05ef3dccec02bab6addf71d9a8243b478b98730d49bf98c0477e1c7fe198e43e2008ce2aff4620c436d58b93d710f381b37807a0076499f52f3052ca46527
-
SSDEEP
1536:nx63pgVMXxpvTTxYmRGzlLZ9HlaAVVtjzX46VdlWT:nM3SSpvvqDzlDl7Vm6VdlWT
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B71D88C-C598-4935-C5D1-43AA4DB90836} 3a3aa6c1122cbdce486771ab2ed985cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B71D88C-C598-4935-C5D1-43AA4DB90836}\stubpath = "C:\\Windows\\system32\\server.exe s" 3a3aa6c1122cbdce486771ab2ed985cd.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Active Setup\Installed Components 3a3aa6c1122cbdce486771ab2ed985cd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\startkey = "C:\\Windows\\system32\\server.exe" 3a3aa6c1122cbdce486771ab2ed985cd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\startkey = "C:\\Windows\\system32\\server.exe" 3a3aa6c1122cbdce486771ab2ed985cd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\plugin1.dat 3a3aa6c1122cbdce486771ab2ed985cd.exe File opened for modification C:\Windows\SysWOW64\server.exe 3a3aa6c1122cbdce486771ab2ed985cd.exe File created C:\Windows\SysWOW64\server.exe 3a3aa6c1122cbdce486771ab2ed985cd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 3a3aa6c1122cbdce486771ab2ed985cd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1284 wrote to memory of 3464 1284 3a3aa6c1122cbdce486771ab2ed985cd.exe 47 PID 1284 wrote to memory of 3464 1284 3a3aa6c1122cbdce486771ab2ed985cd.exe 47 PID 1284 wrote to memory of 3076 1284 3a3aa6c1122cbdce486771ab2ed985cd.exe 93 PID 1284 wrote to memory of 3076 1284 3a3aa6c1122cbdce486771ab2ed985cd.exe 93 PID 1284 wrote to memory of 3076 1284 3a3aa6c1122cbdce486771ab2ed985cd.exe 93 PID 1284 wrote to memory of 3076 1284 3a3aa6c1122cbdce486771ab2ed985cd.exe 93 PID 1284 wrote to memory of 3076 1284 3a3aa6c1122cbdce486771ab2ed985cd.exe 93 PID 1284 wrote to memory of 3076 1284 3a3aa6c1122cbdce486771ab2ed985cd.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\3a3aa6c1122cbdce486771ab2ed985cd.exe"C:\Users\Admin\AppData\Local\Temp\3a3aa6c1122cbdce486771ab2ed985cd.exe"2⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3076
-
-