Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
0155e35d6bf8759c362f66abab374022.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0155e35d6bf8759c362f66abab374022.exe
Resource
win10v2004-20231215-en
General
-
Target
0155e35d6bf8759c362f66abab374022.exe
-
Size
68KB
-
MD5
0155e35d6bf8759c362f66abab374022
-
SHA1
89e4460560ea164e62a6432fd8100c34406ac237
-
SHA256
b54451a17490f0837b2a77491fb0e7c38e8ec2389fc3de700f218d941d255882
-
SHA512
363651c7303013f1e6432cfb6f91f9857c4b2f81e79479127ce16143a869ef05bf7c963031c74165c1778fffc90b6672e6eb0f3b294dc23ec0084f15935c0168
-
SSDEEP
768:FcVliTdyOAl+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:iVIx1AcqOK3qowgnt1d
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0155e35d6bf8759c362f66abab374022.exe -
Executes dropped EXE 1 IoCs
pid Process 2336 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 2816 0155e35d6bf8759c362f66abab374022.exe 2816 0155e35d6bf8759c362f66abab374022.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 0155e35d6bf8759c362f66abab374022.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2816 0155e35d6bf8759c362f66abab374022.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe 2816 0155e35d6bf8759c362f66abab374022.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2816 0155e35d6bf8759c362f66abab374022.exe 2336 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2336 2816 0155e35d6bf8759c362f66abab374022.exe 27 PID 2816 wrote to memory of 2336 2816 0155e35d6bf8759c362f66abab374022.exe 27 PID 2816 wrote to memory of 2336 2816 0155e35d6bf8759c362f66abab374022.exe 27 PID 2816 wrote to memory of 2336 2816 0155e35d6bf8759c362f66abab374022.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0155e35d6bf8759c362f66abab374022.exe"C:\Users\Admin\AppData\Local\Temp\0155e35d6bf8759c362f66abab374022.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD51032e7ae829871c9d5911d18c3b51731
SHA1136d9e0649ee98fa6fb52199f015bdc0ca77fc71
SHA256736d9422b5eeedfdb4f308509e7ae5e2c3f04494bba51b51dc4e935d30752222
SHA512b8120b63c255cdd4f38ec876bdc0067de638913b680180f11261abdab487cb23498c9ba1eef44b3ce44f9342d5511b4ef8f0d282c7a0da2b9a6d3d7caf3dcae1
-
Filesize
44KB
MD5b154d2d1abe1a9bc1bde9563e239e81a
SHA113c1f928ad0be577149537ab7cc8a361466c97b3
SHA2560ee8698d675f1f703afc2e2f7a96206ff67b8ccc5b08bcd6c086df92072db46d
SHA512df132f7d59d8515300eb189d3c73754fc8b1051f769d9e8c75e9195e6d3d5bf56a7bc021ab3af51557d5acfca5e971ce8076747b8d0fa07a54ce1b150f264e0c