Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
3e96e4f57429f9c3df3a3f4279be7e5a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e96e4f57429f9c3df3a3f4279be7e5a.exe
Resource
win10v2004-20231215-en
General
-
Target
3e96e4f57429f9c3df3a3f4279be7e5a.exe
-
Size
449KB
-
MD5
3e96e4f57429f9c3df3a3f4279be7e5a
-
SHA1
665d09557d95d666445d91c3adeb524788a0acda
-
SHA256
d30fddfb8c16ed9d3f3ac22acb29936992778c178ab6a5f90ffef3adfd6f203a
-
SHA512
57a9de75b6e96b38d2414e0fff2e522527408e6ba8e0ce0aabaa39773319f9f3b54694293c7a8e84632b1047ad4fb669133757f4fd818c6c2df9cf727be13e95
-
SSDEEP
12288:2lvM3TF6MnFvMgPArtjTM5klKFqTlfzHyX/GEKBxGSzxv+Z6NNl:2lvMZjvIBYzqTlfLE1Szxv
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2480 dCkkkmJNJGXgCGe.exe -
Loads dropped DLL 3 IoCs
pid Process 2496 3e96e4f57429f9c3df3a3f4279be7e5a.exe 2496 3e96e4f57429f9c3df3a3f4279be7e5a.exe 2480 dCkkkmJNJGXgCGe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\dCkkkmJNJGXgCGe.exe = "C:\\ProgramData\\dCkkkmJNJGXgCGe.exe" 3e96e4f57429f9c3df3a3f4279be7e5a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Download 3e96e4f57429f9c3df3a3f4279be7e5a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 3e96e4f57429f9c3df3a3f4279be7e5a.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2496 3e96e4f57429f9c3df3a3f4279be7e5a.exe 2496 3e96e4f57429f9c3df3a3f4279be7e5a.exe 2480 dCkkkmJNJGXgCGe.exe 2480 dCkkkmJNJGXgCGe.exe 2480 dCkkkmJNJGXgCGe.exe 2480 dCkkkmJNJGXgCGe.exe 2480 dCkkkmJNJGXgCGe.exe 2480 dCkkkmJNJGXgCGe.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2496 3e96e4f57429f9c3df3a3f4279be7e5a.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 dCkkkmJNJGXgCGe.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2480 dCkkkmJNJGXgCGe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2480 2496 3e96e4f57429f9c3df3a3f4279be7e5a.exe 28 PID 2496 wrote to memory of 2480 2496 3e96e4f57429f9c3df3a3f4279be7e5a.exe 28 PID 2496 wrote to memory of 2480 2496 3e96e4f57429f9c3df3a3f4279be7e5a.exe 28 PID 2496 wrote to memory of 2480 2496 3e96e4f57429f9c3df3a3f4279be7e5a.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 3e96e4f57429f9c3df3a3f4279be7e5a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 3e96e4f57429f9c3df3a3f4279be7e5a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e96e4f57429f9c3df3a3f4279be7e5a.exe"C:\Users\Admin\AppData\Local\Temp\3e96e4f57429f9c3df3a3f4279be7e5a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2496 -
C:\ProgramData\dCkkkmJNJGXgCGe.exe"C:\ProgramData\dCkkkmJNJGXgCGe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD53e96e4f57429f9c3df3a3f4279be7e5a
SHA1665d09557d95d666445d91c3adeb524788a0acda
SHA256d30fddfb8c16ed9d3f3ac22acb29936992778c178ab6a5f90ffef3adfd6f203a
SHA51257a9de75b6e96b38d2414e0fff2e522527408e6ba8e0ce0aabaa39773319f9f3b54694293c7a8e84632b1047ad4fb669133757f4fd818c6c2df9cf727be13e95
-
Filesize
412KB
MD5a172533c9a26e7dc982e13a4955bd765
SHA169f99c90ab8cae97c289cc31a9489c8b2d69f3f6
SHA2563dc890446143fe13944d3110235ed5afcc1c4453366fb85d22f9245b0fb5a55e
SHA51220501095643da74f393773b1f23490e70a098db020bf669073affd8c4c310694683eb833469e70fba8554eb6d179c43d5d4a160ea162f539b8a27082e84c810c