Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
4739c398812ae61ec2a5fe123951418f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4739c398812ae61ec2a5fe123951418f.exe
Resource
win10v2004-20231215-en
General
-
Target
4739c398812ae61ec2a5fe123951418f.exe
-
Size
10.4MB
-
MD5
4739c398812ae61ec2a5fe123951418f
-
SHA1
4f1a8876d276db56558d032d2f00a94d8f05e634
-
SHA256
af908a52a53d4ac6d212815924e404cdb13f6e9ebc41e3a381448b4e17c956f3
-
SHA512
b919716914c8f4f765ef32a3f6135629cb4be57b75d7f65861d875d952d3fc259b7aabc360b9b42f526959cdbdc3311a5f444b961d03cde1527a4acde621c293
-
SSDEEP
98304:EcKGDvCcKGD7GDvCcKG/GDvCcjvCciG/GDvCcjvCc9GD7+vCcKGD7GDvCcKG/GDr:EzQkVwVXQkVc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1288 oeatp.exe -
Loads dropped DLL 2 IoCs
pid Process 2336 4739c398812ae61ec2a5fe123951418f.exe 2336 4739c398812ae61ec2a5fe123951418f.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main oeatp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 oeatp.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1288 oeatp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1288 oeatp.exe 1288 oeatp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1288 2336 4739c398812ae61ec2a5fe123951418f.exe 28 PID 2336 wrote to memory of 1288 2336 4739c398812ae61ec2a5fe123951418f.exe 28 PID 2336 wrote to memory of 1288 2336 4739c398812ae61ec2a5fe123951418f.exe 28 PID 2336 wrote to memory of 1288 2336 4739c398812ae61ec2a5fe123951418f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4739c398812ae61ec2a5fe123951418f.exe"C:\Users\Admin\AppData\Local\Temp\4739c398812ae61ec2a5fe123951418f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\oeatp.exeC:\Users\Admin\AppData\Local\Temp\oeatp.exe -run C:\Users\Admin\AppData\Local\Temp\4739c398812ae61ec2a5fe123951418f.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD54eaa62b0ea4a88b2924fb0b30f96875a
SHA1d4eb7b30a7d5279b49962789ce9ad2709844bcf8
SHA256f68d38aee1d8f610b6db11fd3c05c49815e7f61c6c1e69da6aeb96f57de0f067
SHA512ba7656b89103ea5c5da63fdecaefc11656c4f1b641d4de301481966e914c36015643192581f67b8ef7b45a15075ecf585083a9605d86743a5948d78f6290306b
-
Filesize
192KB
MD5e37c01f65f5a809f52f49309d8252e6f
SHA11e981bbd031ca3729576b4bfe102fc5404bbcb0e
SHA25695238a4a86669426a0f16e69634d9401ac62562604bcb7f7c385f58f4573e3d0
SHA5128bf746d5b192a2f8de487d1f87b31609292996fe62ccc8f97df8c4db8d59a1a4090b8f3de15fc4f7a0059662d026ec91f0f8eb6f06a500b727de8c21643aaa1a
-
Filesize
10.5MB
MD5fd8483a504a4a4f7bf816391ab84d891
SHA1a11b7aeb0f4da78dd18d27bf67ed3da21453e125
SHA2569c253a36ae89e79b827e0cdfef4cddb4ef69b38a9a2341ed781c80b0d0284cf7
SHA51228fc77f8ca1d622f42496d318d0cce261d1aa5107c0dcca6fecd11bdad029655e64fbf00927ec876385bf22057a64a294fd9f28b6d0c43418668c7da255bc399