Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
4926bbb87c56d5e3604188dcc5985331.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4926bbb87c56d5e3604188dcc5985331.exe
Resource
win10v2004-20231215-en
General
-
Target
4926bbb87c56d5e3604188dcc5985331.exe
-
Size
2.0MB
-
MD5
4926bbb87c56d5e3604188dcc5985331
-
SHA1
af95b9dfd7e3b69c5e9d7d57785cc65e866d32ef
-
SHA256
1edb194135aa194a2e88a3a3fbf267b3dbc4d1e9536fe147542a7dadfd936c39
-
SHA512
f3a714e41e2f8ee1a720ad973633cd1dacecd6b1d22f0a41576b5815c13cc90e3e3966b7491669d3afc88059b601fb79aea2c83325281a3d58f67f19ed9feb17
-
SSDEEP
24576:+7QFRUm/rCYAj8pXU+Cz/rC6YAj8pXU+Cz/rSCYAj8pXU+Cz/heU+Czr:EQFRHrmQG+yrTQG+yrSmQG+yr+Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2804 dazzm.exe -
Loads dropped DLL 2 IoCs
pid Process 2444 4926bbb87c56d5e3604188dcc5985331.exe 2444 4926bbb87c56d5e3604188dcc5985331.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main dazzm.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 dazzm.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2804 dazzm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 dazzm.exe 2804 dazzm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2804 2444 4926bbb87c56d5e3604188dcc5985331.exe 28 PID 2444 wrote to memory of 2804 2444 4926bbb87c56d5e3604188dcc5985331.exe 28 PID 2444 wrote to memory of 2804 2444 4926bbb87c56d5e3604188dcc5985331.exe 28 PID 2444 wrote to memory of 2804 2444 4926bbb87c56d5e3604188dcc5985331.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4926bbb87c56d5e3604188dcc5985331.exe"C:\Users\Admin\AppData\Local\Temp\4926bbb87c56d5e3604188dcc5985331.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\dazzm.exeC:\Users\Admin\AppData\Local\Temp\dazzm.exe -run C:\Users\Admin\AppData\Local\Temp\4926bbb87c56d5e3604188dcc5985331.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5b3fd5fa1033a1463063bffa4cae27c16
SHA12a1e2478d8ee47c52b977450b4549ee51a60d64c
SHA25694e1ac890bcac0873f9865988e842a6e774bf49e21069dd6e520989cb1e98bf7
SHA512162f0f197d5e8111cdcfa5f6aa09c6bfc242ca10b3cc59bd53d2cf48aa4b82adf7319d1e510db5d7d026cd36e1a9f9e52842899b86d3bccf70ce04229ce8d9c2
-
Filesize
1.6MB
MD5e8aa2295eb9b3a5d7e3d9cd9974957b9
SHA1ee6e6ed9cf2545b407f8160a3154341f28abd37c
SHA256089131c8032e12e73caecea3bddaf88aa0f0335ef598a2c5cbade47c2c4e92da
SHA51279cd5113afc5c6037f52a72f7be151cf04dfa874174e4001b71b5e26e50557e26f7d34d34cd74a0801e7290c6960fa9c566fa8667269baf0209227ba915e7d24
-
Filesize
1.9MB
MD53f8a918457f0533ba32ea7d6bc3525f8
SHA111efd67e13a558f72e9cc9870e18bb4a86e7b736
SHA2569d4de205e67658708fdbc278242c8b3ffd21d5570efc4a224318c45ef1252b6c
SHA5125c0e348fbeecc3a94d3cb5181f9987bed1f61cb8b9bf644491e8d8016327e37c3337142d9d2c32b3c22bd0a6c1e0cc72d234433b90d6afbc92b2ca53ef4cf549
-
Filesize
1.6MB
MD5e96891987e48b169ac634d535174bea4
SHA1c33b984edb29feeeb0f99a9392dfd76765e65896
SHA2565fb5cf09146f44e0662c5f8fef242a2ab3539904b8372cecebd22af383ab6320
SHA5128c242487ce7b30fe4c5eb32e37347b70b2a0818aa77c071ec24f59c8078f94f9921a82c5fd64e97f990bee2ed2194e6866ecbcc04d56ddd364e89785f3202100