Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02-01-2024 17:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e882d29a55e8a8f163f39b114d2bd7a.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e882d29a55e8a8f163f39b114d2bd7a.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
3e882d29a55e8a8f163f39b114d2bd7a.exe
-
Size
655KB
-
MD5
3e882d29a55e8a8f163f39b114d2bd7a
-
SHA1
95a56785c53565243748b1ffe9af09a4e17754f1
-
SHA256
312e098ad90418ff893aeec9d194378b098113192ef0b2a4434e46f092e2e2a3
-
SHA512
fdb697796bf97c7de37a693a4f9e981e72dbe35933e31a6571edf3652bca804c573c08b9f8ac7cb30089bacb88f9970c0710ac13dfb01dcef3187996aa65d631
-
SSDEEP
12288:s9JfsVNlpvJx+s2+aO+jgPYvO/WybtslriY7Dkx+FK4FGadofqfKiUDa:qJfsrv4+aRjQYDYa7sx+ZiqfEG
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2212-13-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-111-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-113-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-115-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-117-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-116-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-112-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-12-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-127-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-162-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-188-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-198-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-202-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-197-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-208-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-204-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-213-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-214-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-212-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-209-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-196-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-216-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-195-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-194-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-193-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-189-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-11-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-10-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-6-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-217-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-218-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-220-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-221-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-223-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-224-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-222-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-226-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-228-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-230-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-232-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-233-0x0000000001D00000-0x0000000001E34000-memory.dmp upx behavioral1/memory/2212-337-0x0000000001D00000-0x0000000001E34000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is259396418.log 3e882d29a55e8a8f163f39b114d2bd7a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main 3e882d29a55e8a8f163f39b114d2bd7a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2212 3e882d29a55e8a8f163f39b114d2bd7a.exe 2212 3e882d29a55e8a8f163f39b114d2bd7a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2212 3e882d29a55e8a8f163f39b114d2bd7a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2212 3e882d29a55e8a8f163f39b114d2bd7a.exe 2212 3e882d29a55e8a8f163f39b114d2bd7a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e882d29a55e8a8f163f39b114d2bd7a.exe"C:\Users\Admin\AppData\Local\Temp\3e882d29a55e8a8f163f39b114d2bd7a.exe"1⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2212