Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
47f34d6cd488a199589fd5e32cd9afdd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47f34d6cd488a199589fd5e32cd9afdd.exe
Resource
win10v2004-20231215-en
General
-
Target
47f34d6cd488a199589fd5e32cd9afdd.exe
-
Size
324KB
-
MD5
47f34d6cd488a199589fd5e32cd9afdd
-
SHA1
1b2ab080c581502913cad59238eb42619b40fa3a
-
SHA256
d57d89cac66f8e76308ff9ba02e302b94e5c703b24d09e8eda807ed42c6a00d6
-
SHA512
0e0c6bc06905ab28b801f86dddfb3ac829a516cb264db5a2462b558fa273adbcf2fb8044d831681162021ce18393d61cd7b0944c4ca7fef52839a1df9cf688e9
-
SSDEEP
6144:Sls0Mhrt8Xl/UHJYh88HuoiPgMBMhDjbP4qIT1dqUkgu36iD:SlsFdtCl/D83oWaDnDMqUY3hD
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2532 ksm.exe -
Executes dropped EXE 1 IoCs
pid Process 2532 ksm.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 47f34d6cd488a199589fd5e32cd9afdd.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\Content Type = "application/x-msdownload" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ksm.exe\" -a \"%1\" %*" ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\DefaultIcon\ = "%1" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\ = "Application" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\DefaultIcon ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" ksm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" ksm.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\ = "Application" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ksm.exe\" -a \"%1\" %*" ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\Content Type = "application/x-msdownload" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\DefaultIcon ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\DefaultIcon\ = "%1" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\start\command ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\DefaultIcon ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\start ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\DefaultIcon\ = "%1" ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\ = "exefile" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open\command ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ksm.exe\" -a \"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\Content Type = "application/x-msdownload" ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas\command ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command ksm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" ksm.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 2532 ksm.exe 2532 ksm.exe 2532 ksm.exe 2532 ksm.exe 2532 ksm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2648 explorer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe Token: SeShutdownPrivilege 2648 explorer.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2532 ksm.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2532 ksm.exe 2648 explorer.exe 2648 explorer.exe 2532 ksm.exe 2532 ksm.exe 2648 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2532 ksm.exe 2532 ksm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2532 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 28 PID 2976 wrote to memory of 2532 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 28 PID 2976 wrote to memory of 2532 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 28 PID 2976 wrote to memory of 2532 2976 47f34d6cd488a199589fd5e32cd9afdd.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\47f34d6cd488a199589fd5e32cd9afdd.exe"C:\Users\Admin\AppData\Local\Temp\47f34d6cd488a199589fd5e32cd9afdd.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\ksm.exe"C:\Users\Admin\AppData\Local\ksm.exe" -gav C:\Users\Admin\AppData\Local\Temp\47f34d6cd488a199589fd5e32cd9afdd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2532
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD547f34d6cd488a199589fd5e32cd9afdd
SHA11b2ab080c581502913cad59238eb42619b40fa3a
SHA256d57d89cac66f8e76308ff9ba02e302b94e5c703b24d09e8eda807ed42c6a00d6
SHA5120e0c6bc06905ab28b801f86dddfb3ac829a516cb264db5a2462b558fa273adbcf2fb8044d831681162021ce18393d61cd7b0944c4ca7fef52839a1df9cf688e9
-
Filesize
69KB
MD5431bb79edb113cee9f265cfaa60ef1c5
SHA1ee445f6fdc59cd4eadc4c4a42bc460c47cb58d59
SHA2564dab070afcd960c150ffe58b08dc7a67ebfb37007200117df45deb032a7f3e5d
SHA5121e39be1b822fd91408d279052787287a53b050a2359b750fe3653a26831c147a45fee1109b5d47029105db1e877ba31afef73ef97f8ae2c20c08a903066adc72