Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 14:23
Behavioral task
behavioral1
Sample
46742695985084eaf30fe9017f96d18d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46742695985084eaf30fe9017f96d18d.exe
Resource
win10v2004-20231215-en
General
-
Target
46742695985084eaf30fe9017f96d18d.exe
-
Size
308KB
-
MD5
46742695985084eaf30fe9017f96d18d
-
SHA1
77dde6df66db9db6612f132da8db4746aec92dd1
-
SHA256
18b673de85eb8e70af48cf8d02c20cfda6155b167dc8a3520acb98fb20525e8b
-
SHA512
12e36ef51c865472babe6ab2cfd91ee2dbcb8ec4a598893196a9b31ab0f2b29c2b9973a338592de6fbd785a1362a15860b8d1b51a1506949ec604842d07cb472
-
SSDEEP
6144:/n6dmQl5CwO2fEB8XvtjmkASwnLpFGZY35xPul/pbPF/UQl4y7pObVUUloS:whl5CwNA1tJkYJxGZfUbyEb/loS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2768 9A0D2F9153D.exe 2680 mUe901F.exe -
Loads dropped DLL 4 IoCs
pid Process 2448 46742695985084eaf30fe9017f96d18d.exe 2448 46742695985084eaf30fe9017f96d18d.exe 2768 9A0D2F9153D.exe 2768 9A0D2F9153D.exe -
resource yara_rule behavioral1/memory/2448-0-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2448-2-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2448-4-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2448-5-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2448-8-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/files/0x002600000001529f-16.dat upx behavioral1/memory/2768-24-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2768-27-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2768-28-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2448-33-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2768-44-0x0000000000400000-0x000000000048D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\2X9I7BYX7HVD2FVWAIRHAHUSJBGJNP = "C:\\config.Bin\\9A0D2F9153D.exe /q" mUe901F.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PhishingFilter mUe901F.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" mUe901F.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" mUe901F.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery mUe901F.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" mUe901F.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2448 46742695985084eaf30fe9017f96d18d.exe 2448 46742695985084eaf30fe9017f96d18d.exe 2768 9A0D2F9153D.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe 2680 mUe901F.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2448 46742695985084eaf30fe9017f96d18d.exe Token: SeDebugPrivilege 2448 46742695985084eaf30fe9017f96d18d.exe Token: SeDebugPrivilege 2448 46742695985084eaf30fe9017f96d18d.exe Token: SeDebugPrivilege 2448 46742695985084eaf30fe9017f96d18d.exe Token: SeDebugPrivilege 2768 9A0D2F9153D.exe Token: SeDebugPrivilege 2768 9A0D2F9153D.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe Token: SeDebugPrivilege 2680 mUe901F.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2768 2448 46742695985084eaf30fe9017f96d18d.exe 28 PID 2448 wrote to memory of 2768 2448 46742695985084eaf30fe9017f96d18d.exe 28 PID 2448 wrote to memory of 2768 2448 46742695985084eaf30fe9017f96d18d.exe 28 PID 2448 wrote to memory of 2768 2448 46742695985084eaf30fe9017f96d18d.exe 28 PID 2768 wrote to memory of 2680 2768 9A0D2F9153D.exe 29 PID 2768 wrote to memory of 2680 2768 9A0D2F9153D.exe 29 PID 2768 wrote to memory of 2680 2768 9A0D2F9153D.exe 29 PID 2768 wrote to memory of 2680 2768 9A0D2F9153D.exe 29 PID 2768 wrote to memory of 2680 2768 9A0D2F9153D.exe 29 PID 2768 wrote to memory of 2680 2768 9A0D2F9153D.exe 29 PID 2680 wrote to memory of 2448 2680 mUe901F.exe 27 PID 2680 wrote to memory of 2448 2680 mUe901F.exe 27 PID 2680 wrote to memory of 2448 2680 mUe901F.exe 27 PID 2680 wrote to memory of 2448 2680 mUe901F.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\46742695985084eaf30fe9017f96d18d.exe"C:\Users\Admin\AppData\Local\Temp\46742695985084eaf30fe9017f96d18d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\config.Bin\9A0D2F9153D.exe"C:\config.Bin\9A0D2F9153D.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\mUe901F.exe"C:\Users\Admin\AppData\Local\Temp\mUe901F.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5eeac0c59a8f476975e3662059e9509e0
SHA1c60c35f35ff07b6b78fae2ff13da3c688cb9944e
SHA2561e483cc6463af2ce628515f950f232d288ba4cea8cd79843559192ca0e7c970d
SHA512099b11c96d755d41bf45a50064a28af0ddd2be545871cb40e36129b79f77406b1b2e58ceff81900eef869c9ff9868589f71468071687dad46d9a8aa3aeb0f84a
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
308KB
MD546742695985084eaf30fe9017f96d18d
SHA177dde6df66db9db6612f132da8db4746aec92dd1
SHA25618b673de85eb8e70af48cf8d02c20cfda6155b167dc8a3520acb98fb20525e8b
SHA51212e36ef51c865472babe6ab2cfd91ee2dbcb8ec4a598893196a9b31ab0f2b29c2b9973a338592de6fbd785a1362a15860b8d1b51a1506949ec604842d07cb472