Analysis
-
max time kernel
2s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 10:21
Behavioral task
behavioral1
Sample
11ea1cac1b6a156f34248849aa7907cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11ea1cac1b6a156f34248849aa7907cb.exe
Resource
win10v2004-20231215-en
General
-
Target
11ea1cac1b6a156f34248849aa7907cb.exe
-
Size
522KB
-
MD5
11ea1cac1b6a156f34248849aa7907cb
-
SHA1
8c11db6b05f2878e263279296e8105136baebb92
-
SHA256
14edc7e17f0f54eb4c750ef54e79b7241b77094ffe6d39f2a7e6d5583dead4b0
-
SHA512
624f2f6ceebab94d66475403d4f0ccb116ac317f586b017a8c64b80caa6fa2fcfe8a324b6b5a5a6797dc9958ae41d4ed4fefe8915058b88d1131e53a19a365e0
-
SSDEEP
12288:wMgDksy9lYyxFSMZQ+peBI+lkHQ4jC9FfmiqZZ4C8+db:vH3YyxFhZ8rKHXcFf5qECJb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3600-0-0x0000000000400000-0x00000000005AF000-memory.dmp upx behavioral2/memory/3600-21-0x0000000000400000-0x00000000005AF000-memory.dmp upx behavioral2/memory/4320-19-0x0000000000400000-0x00000000005AF000-memory.dmp upx C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe upx behavioral2/memory/3520-26-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-28-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4320-27-0x0000000000400000-0x00000000005AF000-memory.dmp upx C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe upx behavioral2/memory/3520-23-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-34-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-35-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-36-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-38-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-39-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-40-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-42-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-43-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-44-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3520-46-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 4608 reg.exe 4424 reg.exe 3716 reg.exe 392 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
11ea1cac1b6a156f34248849aa7907cb.exepid process 3600 11ea1cac1b6a156f34248849aa7907cb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11ea1cac1b6a156f34248849aa7907cb.exe"C:\Users\Admin\AppData\Local\Temp\11ea1cac1b6a156f34248849aa7907cb.exe"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe"C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe"C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240603281.bat" "2⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SerbianPersian" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe" /f1⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\i4i.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\i4i.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\i4i.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\i4i.exe:*:Enabled:Windows Messanger" /f1⤵
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exe:*:Enabled:Windows Messanger" /f1⤵
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\SerbianPersia\SerbianPersia.exeFilesize
4KB
MD5976537af0f1971ee00a3b5a044a1fe06
SHA1967956146b8409fc4e9dfe9a3a9f99e6a8f009e8
SHA25699af9e6a858690fe7e7af8d8b7d314e5cc8067dd4c530a3662e3e6e5d47213fc
SHA51292b20c37964b7184c50b28e424a81611b34a4953d86c6cc48aeb5edd00ee0fd6b019838861523c06774ce41a34aa119c67c62dd1db0066c70195a8303e4b61ca
-
memory/3520-23-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-42-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-26-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-28-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-46-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-44-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-43-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-34-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-35-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-36-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-38-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-39-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3520-40-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3600-0-0x0000000000400000-0x00000000005AF000-memory.dmpFilesize
1.7MB
-
memory/3600-21-0x0000000000400000-0x00000000005AF000-memory.dmpFilesize
1.7MB
-
memory/4320-19-0x0000000000400000-0x00000000005AF000-memory.dmpFilesize
1.7MB
-
memory/4320-27-0x0000000000400000-0x00000000005AF000-memory.dmpFilesize
1.7MB