Analysis
-
max time kernel
16s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 15:53
Behavioral task
behavioral1
Sample
3a7500ade978dc465e5465f8fe5e54e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a7500ade978dc465e5465f8fe5e54e0.exe
Resource
win10v2004-20231215-en
General
-
Target
3a7500ade978dc465e5465f8fe5e54e0.exe
-
Size
273KB
-
MD5
3a7500ade978dc465e5465f8fe5e54e0
-
SHA1
b4b56660e1dda0ca737b82caa05ef6ecabc61eee
-
SHA256
58c12bde51210959cb850638112ab9843b84dc766af3ba3adc8206dc54a66ac7
-
SHA512
2c431277572a459e732d4c7f001f37a97cfebb25e5c5d602a1291f4780533c53fface50f3047786fc7781d154b91cac9e6a3a52b010e114c7f14869e480ae9b0
-
SSDEEP
3072:+CZ2nsBAGrmiO3ovf4EdYwzFyWYziFIMYHKy6K4EuTNIZvtOzEtTxg6vE7AAcmWW:v4bWF3YGFEZ6KxkNI7OzEJxgNVc
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 540 40842F3812B.exe 576 40842F3812B.exe 2660 tFR8E3B.exe -
Loads dropped DLL 5 IoCs
pid Process 2016 3a7500ade978dc465e5465f8fe5e54e0.exe 2016 3a7500ade978dc465e5465f8fe5e54e0.exe 540 40842F3812B.exe 576 40842F3812B.exe 576 40842F3812B.exe -
resource yara_rule behavioral1/memory/1888-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2016-5-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1888-15-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2016-21-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2016-20-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2016-19-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2016-18-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2016-17-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2016-16-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2016-14-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2016-12-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2016-7-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/540-40-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/576-60-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2016-99-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2016-164-0x0000000000470000-0x00000000004B6000-memory.dmp upx behavioral1/memory/576-77-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/576-56-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/540-54-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/files/0x000e00000001224d-52.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZD6J0B3C9F2Z3F8DZASPXNIMU = "C:\\g4fweq23.Bi\\40842F3812B.exe /q" tFR8E3B.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1888 set thread context of 2016 1888 3a7500ade978dc465e5465f8fe5e54e0.exe 18 PID 540 set thread context of 576 540 40842F3812B.exe 30 -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PhishingFilter tFR8E3B.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" tFR8E3B.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" tFR8E3B.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery tFR8E3B.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" tFR8E3B.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2016 3a7500ade978dc465e5465f8fe5e54e0.exe 2016 3a7500ade978dc465e5465f8fe5e54e0.exe 576 40842F3812B.exe 2660 tFR8E3B.exe 2660 tFR8E3B.exe 2660 tFR8E3B.exe 2660 tFR8E3B.exe 2660 tFR8E3B.exe 2660 tFR8E3B.exe 2660 tFR8E3B.exe 2660 tFR8E3B.exe 2660 tFR8E3B.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2016 3a7500ade978dc465e5465f8fe5e54e0.exe Token: SeDebugPrivilege 2016 3a7500ade978dc465e5465f8fe5e54e0.exe Token: SeDebugPrivilege 2016 3a7500ade978dc465e5465f8fe5e54e0.exe Token: SeDebugPrivilege 2016 3a7500ade978dc465e5465f8fe5e54e0.exe Token: SeDebugPrivilege 576 40842F3812B.exe Token: SeDebugPrivilege 576 40842F3812B.exe Token: SeDebugPrivilege 2660 tFR8E3B.exe Token: SeDebugPrivilege 2660 tFR8E3B.exe Token: SeDebugPrivilege 2660 tFR8E3B.exe Token: SeDebugPrivilege 2660 tFR8E3B.exe Token: SeDebugPrivilege 2660 tFR8E3B.exe Token: SeDebugPrivilege 2660 tFR8E3B.exe Token: SeDebugPrivilege 2660 tFR8E3B.exe Token: SeDebugPrivilege 2660 tFR8E3B.exe Token: SeDebugPrivilege 2660 tFR8E3B.exe Token: SeDebugPrivilege 2660 tFR8E3B.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1888 3a7500ade978dc465e5465f8fe5e54e0.exe 540 40842F3812B.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2016 1888 3a7500ade978dc465e5465f8fe5e54e0.exe 18 PID 1888 wrote to memory of 2016 1888 3a7500ade978dc465e5465f8fe5e54e0.exe 18 PID 1888 wrote to memory of 2016 1888 3a7500ade978dc465e5465f8fe5e54e0.exe 18 PID 1888 wrote to memory of 2016 1888 3a7500ade978dc465e5465f8fe5e54e0.exe 18 PID 1888 wrote to memory of 2016 1888 3a7500ade978dc465e5465f8fe5e54e0.exe 18 PID 1888 wrote to memory of 2016 1888 3a7500ade978dc465e5465f8fe5e54e0.exe 18 PID 1888 wrote to memory of 2016 1888 3a7500ade978dc465e5465f8fe5e54e0.exe 18 PID 1888 wrote to memory of 2016 1888 3a7500ade978dc465e5465f8fe5e54e0.exe 18 PID 2016 wrote to memory of 540 2016 3a7500ade978dc465e5465f8fe5e54e0.exe 31 PID 2016 wrote to memory of 540 2016 3a7500ade978dc465e5465f8fe5e54e0.exe 31 PID 2016 wrote to memory of 540 2016 3a7500ade978dc465e5465f8fe5e54e0.exe 31 PID 2016 wrote to memory of 540 2016 3a7500ade978dc465e5465f8fe5e54e0.exe 31 PID 540 wrote to memory of 576 540 40842F3812B.exe 30 PID 540 wrote to memory of 576 540 40842F3812B.exe 30 PID 540 wrote to memory of 576 540 40842F3812B.exe 30 PID 540 wrote to memory of 576 540 40842F3812B.exe 30 PID 540 wrote to memory of 576 540 40842F3812B.exe 30 PID 540 wrote to memory of 576 540 40842F3812B.exe 30 PID 540 wrote to memory of 576 540 40842F3812B.exe 30 PID 540 wrote to memory of 576 540 40842F3812B.exe 30 PID 576 wrote to memory of 2660 576 40842F3812B.exe 29 PID 576 wrote to memory of 2660 576 40842F3812B.exe 29 PID 576 wrote to memory of 2660 576 40842F3812B.exe 29 PID 576 wrote to memory of 2660 576 40842F3812B.exe 29 PID 576 wrote to memory of 2660 576 40842F3812B.exe 29 PID 576 wrote to memory of 2660 576 40842F3812B.exe 29 PID 2660 wrote to memory of 2016 2660 tFR8E3B.exe 18 PID 2660 wrote to memory of 2016 2660 tFR8E3B.exe 18 PID 2660 wrote to memory of 2016 2660 tFR8E3B.exe 18 PID 2660 wrote to memory of 2016 2660 tFR8E3B.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a7500ade978dc465e5465f8fe5e54e0.exe"C:\Users\Admin\AppData\Local\Temp\3a7500ade978dc465e5465f8fe5e54e0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\3a7500ade978dc465e5465f8fe5e54e0.exe"C:\Users\Admin\AppData\Local\Temp\3a7500ade978dc465e5465f8fe5e54e0.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\g4fweq23.Bi\40842F3812B.exe"C:\g4fweq23.Bi\40842F3812B.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\tFR8E3B.exe"C:\Users\Admin\AppData\Local\Temp\tFR8E3B.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660
-
C:\g4fweq23.Bi\40842F3812B.exe"C:\g4fweq23.Bi\40842F3812B.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD53a7500ade978dc465e5465f8fe5e54e0
SHA1b4b56660e1dda0ca737b82caa05ef6ecabc61eee
SHA25658c12bde51210959cb850638112ab9843b84dc766af3ba3adc8206dc54a66ac7
SHA5122c431277572a459e732d4c7f001f37a97cfebb25e5c5d602a1291f4780533c53fface50f3047786fc7781d154b91cac9e6a3a52b010e114c7f14869e480ae9b0