Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
42e414caf013083e1ed7c200113103c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42e414caf013083e1ed7c200113103c8.exe
Resource
win10v2004-20231215-en
General
-
Target
42e414caf013083e1ed7c200113103c8.exe
-
Size
157KB
-
MD5
42e414caf013083e1ed7c200113103c8
-
SHA1
1cb980d081150d650805c4d91f64dde02b19da04
-
SHA256
38f7ee6773daeb05b265a4c2efe7905c69a2f83bbf0e7a07a0b9fa452cf5ed28
-
SHA512
25440450f7216fb9a159a49fd16e45a219021d9e72dd2a1a1acffa433d86f3c18d615a30773e7602ca846125d7159de7eb747895df1b4f96d4160f721c34bb43
-
SSDEEP
3072:H686MqF74XonmTQD2tVfSxL8P5PPyUZjskF:aD4VTKafSxL8PZP5F
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 42e414caf013083e1ed7c200113103c8.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 42e414caf013083e1ed7c200113103c8.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\J: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\I: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\X: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\U: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\S: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\Q: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\G: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\E: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\Z: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\W: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\P: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\O: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\N: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\M: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\V: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\T: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\R: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\L: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\K: 42e414caf013083e1ed7c200113103c8.exe File opened (read-only) \??\H: 42e414caf013083e1ed7c200113103c8.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf 42e414caf013083e1ed7c200113103c8.exe File opened for modification C:\autorun.inf 42e414caf013083e1ed7c200113103c8.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf 42e414caf013083e1ed7c200113103c8.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\MSPUB.EXE 42e414caf013083e1ed7c200113103c8.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\OIS.EXE 42e414caf013083e1ed7c200113103c8.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\ONENOTE.EXE 42e414caf013083e1ed7c200113103c8.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\OUTLOOK.EXE 42e414caf013083e1ed7c200113103c8.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\EXCEL.EXE 42e414caf013083e1ed7c200113103c8.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\GROOVE.EXE 42e414caf013083e1ed7c200113103c8.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\INFOPATH.EXE 42e414caf013083e1ed7c200113103c8.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\MSACCESS.EXE 42e414caf013083e1ed7c200113103c8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2612 2768 WerFault.exe 15 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2768 42e414caf013083e1ed7c200113103c8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2612 2768 42e414caf013083e1ed7c200113103c8.exe 16 PID 2768 wrote to memory of 2612 2768 42e414caf013083e1ed7c200113103c8.exe 16 PID 2768 wrote to memory of 2612 2768 42e414caf013083e1ed7c200113103c8.exe 16 PID 2768 wrote to memory of 2612 2768 42e414caf013083e1ed7c200113103c8.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\42e414caf013083e1ed7c200113103c8.exe"C:\Users\Admin\AppData\Local\Temp\42e414caf013083e1ed7c200113103c8.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 5322⤵
- Program crash
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
68KB
MD58afcabbf4b9bdd5670e5a20b664fa06b
SHA14c4edb897539344424c93d25ac2ae1c00ff30689
SHA256c8a4e886e160fc517c8d869547d2c5a18bd1a7604b8fa91f5dce295862a5111f
SHA512e9fd9eca42dd0c5e67446e2bee7693306bdb9839a442e7bf077e56bde664a484a4110c87da4fe4d32a1a898e66e201d7f1f0f5d1b3c22004abdaea91e7857e9f