Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
3e48c3bcb96539709188892346124b3e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3e48c3bcb96539709188892346124b3e.exe
Resource
win10v2004-20231215-en
General
-
Target
3e48c3bcb96539709188892346124b3e.exe
-
Size
282KB
-
MD5
3e48c3bcb96539709188892346124b3e
-
SHA1
6c0e9c4fca7a1a51588667ecb306f7a76563b50a
-
SHA256
4e412b5dd0086b4f11f8766f4ed38c0687bd6c82e405131a2f9247f01c790604
-
SHA512
7341072f4190b5bf87bda45616ad4af7a0072ec5ebfe66da2737a565cfb38885f0bc9404dccb477a27bb4bfc2579d16c33e0b878ee224662e5749904c9ad17c2
-
SSDEEP
6144:8FTbKMJvDpB7wY4n74fHyjZRVkc2py7u/qbWhpD:8UavVZu7WoZRV+cu/qqhpD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1672 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 timei.exe -
Loads dropped DLL 2 IoCs
pid Process 2252 3e48c3bcb96539709188892346124b3e.exe 2252 3e48c3bcb96539709188892346124b3e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E705BD28-DA76-AD4E-D262-B4D1F82197CC} = "C:\\Users\\Admin\\AppData\\Roaming\\Ywsuon\\timei.exe" timei.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 1672 2252 3e48c3bcb96539709188892346124b3e.exe 17 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Privacy 3e48c3bcb96539709188892346124b3e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 3e48c3bcb96539709188892346124b3e.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe 2396 timei.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2252 3e48c3bcb96539709188892346124b3e.exe 2396 timei.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2396 2252 3e48c3bcb96539709188892346124b3e.exe 16 PID 2252 wrote to memory of 2396 2252 3e48c3bcb96539709188892346124b3e.exe 16 PID 2252 wrote to memory of 2396 2252 3e48c3bcb96539709188892346124b3e.exe 16 PID 2252 wrote to memory of 2396 2252 3e48c3bcb96539709188892346124b3e.exe 16 PID 2396 wrote to memory of 1276 2396 timei.exe 9 PID 2396 wrote to memory of 1276 2396 timei.exe 9 PID 2396 wrote to memory of 1276 2396 timei.exe 9 PID 2396 wrote to memory of 1276 2396 timei.exe 9 PID 2396 wrote to memory of 1276 2396 timei.exe 9 PID 2396 wrote to memory of 1344 2396 timei.exe 8 PID 2396 wrote to memory of 1344 2396 timei.exe 8 PID 2396 wrote to memory of 1344 2396 timei.exe 8 PID 2396 wrote to memory of 1344 2396 timei.exe 8 PID 2396 wrote to memory of 1344 2396 timei.exe 8 PID 2396 wrote to memory of 1380 2396 timei.exe 7 PID 2396 wrote to memory of 1380 2396 timei.exe 7 PID 2396 wrote to memory of 1380 2396 timei.exe 7 PID 2396 wrote to memory of 1380 2396 timei.exe 7 PID 2396 wrote to memory of 1380 2396 timei.exe 7 PID 2396 wrote to memory of 1888 2396 timei.exe 5 PID 2396 wrote to memory of 1888 2396 timei.exe 5 PID 2396 wrote to memory of 1888 2396 timei.exe 5 PID 2396 wrote to memory of 1888 2396 timei.exe 5 PID 2396 wrote to memory of 1888 2396 timei.exe 5 PID 2396 wrote to memory of 2252 2396 timei.exe 1 PID 2396 wrote to memory of 2252 2396 timei.exe 1 PID 2396 wrote to memory of 2252 2396 timei.exe 1 PID 2396 wrote to memory of 2252 2396 timei.exe 1 PID 2396 wrote to memory of 2252 2396 timei.exe 1 PID 2252 wrote to memory of 1672 2252 3e48c3bcb96539709188892346124b3e.exe 17 PID 2252 wrote to memory of 1672 2252 3e48c3bcb96539709188892346124b3e.exe 17 PID 2252 wrote to memory of 1672 2252 3e48c3bcb96539709188892346124b3e.exe 17 PID 2252 wrote to memory of 1672 2252 3e48c3bcb96539709188892346124b3e.exe 17 PID 2252 wrote to memory of 1672 2252 3e48c3bcb96539709188892346124b3e.exe 17 PID 2252 wrote to memory of 1672 2252 3e48c3bcb96539709188892346124b3e.exe 17 PID 2252 wrote to memory of 1672 2252 3e48c3bcb96539709188892346124b3e.exe 17 PID 2252 wrote to memory of 1672 2252 3e48c3bcb96539709188892346124b3e.exe 17 PID 2252 wrote to memory of 1672 2252 3e48c3bcb96539709188892346124b3e.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e48c3bcb96539709188892346124b3e.exe"C:\Users\Admin\AppData\Local\Temp\3e48c3bcb96539709188892346124b3e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\Ywsuon\timei.exe"C:\Users\Admin\AppData\Roaming\Ywsuon\timei.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcefb4231.bat"2⤵
- Deletes itself
PID:1672
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1888
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1344
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5e9bc46289f2bac914ce400959e158237
SHA14d1636ec87ac8f73fcaa832540be84751d097da3
SHA2561fabbec49fd9c817bcee9a720dea58d87705565b2e4b87ef3fd90becee48a2a3
SHA512212c8be78bf18af772a064b97bd67d4f7b98f24ccfe309dcb0d585d3e955baeb41d64a2a2f7d8e4efa0fedcb55b796d7f86d25c4804f539e08bd601af9a97e34