Analysis
-
max time kernel
266s -
max time network
319s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe
Resource
win10v2004-20231222-en
General
-
Target
3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe
-
Size
663KB
-
MD5
3ecb9ec3bdb4b4cedc2b0bf90e2a65ff
-
SHA1
c49d9bb05210d6f581635ecb8d11a90c253ff283
-
SHA256
eb01159dd0da755c77baf8b111a89f52dbcebd17739fa8a595905c84a815a37e
-
SHA512
2305cca826b0f28315b0ee9e0c4dbb0b3703dd6a2888cfd7447cff9386ffa56ccb610da4e9b4b59383b890926cee459c721d98aba9fa16c451907e0a8e03c684
-
SSDEEP
12288:GFGawBwy2MZqy4e2TgQCgjUapKV22oLeuMNRwE4jvTYolQBGBWyFmErLKd9XqdgT:Nawr7Zo7CgZu2E4Sx0OT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2908 opeBA0C.exe 1748 G_Server1.23.exe -
Loads dropped DLL 2 IoCs
pid Process 1736 3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe 1736 3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\G_Server1.23.exe opeBA0C.exe File created C:\Windows\G_Server1.23.exe opeBA0C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\System G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm G_Server1.23.exe Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" G_Server1.23.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 G_Server1.23.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2908 1736 3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe 26 PID 1736 wrote to memory of 2908 1736 3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe 26 PID 1736 wrote to memory of 2908 1736 3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe 26 PID 1736 wrote to memory of 2908 1736 3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe 26 PID 1748 wrote to memory of 2684 1748 G_Server1.23.exe 28 PID 1748 wrote to memory of 2684 1748 G_Server1.23.exe 28 PID 1748 wrote to memory of 2684 1748 G_Server1.23.exe 28 PID 1748 wrote to memory of 2684 1748 G_Server1.23.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe"C:\Users\Admin\AppData\Local\Temp\3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\opeBA0C.exe"C:\Users\Admin\AppData\Local\Temp\opeBA0C.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2908
-
-
C:\Windows\G_Server1.23.exeC:\Windows\G_Server1.23.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files\Internet ExplorEr\IEXPLORE.EXE"C:\Program Files\Internet ExplorEr\IEXPLORE.EXE"2⤵PID:2684
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a81⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
662KB
MD527d3c239e174703881f63ce3d8529a5c
SHA1cb74253ff5d6c23d57c83da03d297e1f2738540b
SHA25685740aa7a79037f63448363c1ab4b7c00dade664f8c54d433b39f3f329ba0584
SHA5122a50ef977df2bd4fd9af2698cd09700f7a40765548a66825882e56c425a4406709d208377d924399849fced9a8dfbf3bdd86fd0e26e08dcf8d11dda489ad6761
-
Filesize
240KB
MD59e5229806d18c0ce9c173e9494904abc
SHA14fc944302e06e8825327647821cd4440cd0f5719
SHA256e655969a8e6e9c4f699ab9cd6ac6daf073a5491e44501d1f5e0c491972af4381
SHA5120cb572a818408e9518100464595d4ce755b0e81d1c152fa884b645e0a72af4660cdbb035275167a61c9da6cf0122506e2ae3aad8f4ac008caffe4940ac608bd7