Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
4bb20eea8ad652d0a7dbc586cc036166.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4bb20eea8ad652d0a7dbc586cc036166.exe
Resource
win10v2004-20231222-en
General
-
Target
4bb20eea8ad652d0a7dbc586cc036166.exe
-
Size
914KB
-
MD5
4bb20eea8ad652d0a7dbc586cc036166
-
SHA1
863491c988880079055c3e32a45dcd4730e2695d
-
SHA256
eb01b6df8e806ed281634df13878069cda1f2fb700f3595719a247e19b01b069
-
SHA512
2e0539938ebf4fa041b0e274e6711700146f6e0694b21b975408e528f6df36c133d1120ae82436f84ab783deffe1b773db75ad5ff6d1af79a1e9e8cb2f087af1
-
SSDEEP
24576:3cNaDN4fLYRS83wLBX+R3/4M/9cloVhLTl:3waifYCJ+OI5Xv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1932 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 5315918745.exe -
Loads dropped DLL 4 IoCs
pid Process 1932 cmd.exe 1932 cmd.exe 2772 5315918745.exe 2772 5315918745.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\4bb20eea8ad652d0a7dbc586cc036166 = "\"C:\\Users\\Admin\\AppData\\Local\\5315918745.exe\" 0 20 " 4bb20eea8ad652d0a7dbc586cc036166.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\5315918745 = "\"C:\\Users\\Admin\\AppData\\Local\\5315918745.exe\" 0 41 " 5315918745.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2708 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2772 5315918745.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe 2772 5315918745.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1180 wrote to memory of 1932 1180 4bb20eea8ad652d0a7dbc586cc036166.exe 28 PID 1180 wrote to memory of 1932 1180 4bb20eea8ad652d0a7dbc586cc036166.exe 28 PID 1180 wrote to memory of 1932 1180 4bb20eea8ad652d0a7dbc586cc036166.exe 28 PID 1180 wrote to memory of 1932 1180 4bb20eea8ad652d0a7dbc586cc036166.exe 28 PID 1932 wrote to memory of 2708 1932 cmd.exe 30 PID 1932 wrote to memory of 2708 1932 cmd.exe 30 PID 1932 wrote to memory of 2708 1932 cmd.exe 30 PID 1932 wrote to memory of 2708 1932 cmd.exe 30 PID 1932 wrote to memory of 2772 1932 cmd.exe 31 PID 1932 wrote to memory of 2772 1932 cmd.exe 31 PID 1932 wrote to memory of 2772 1932 cmd.exe 31 PID 1932 wrote to memory of 2772 1932 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bb20eea8ad652d0a7dbc586cc036166.exe"C:\Users\Admin\AppData\Local\Temp\4bb20eea8ad652d0a7dbc586cc036166.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\467898.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 4bb20eea8ad652d0a7dbc586cc036166 /f3⤵
- Modifies registry key
PID:2708
-
-
C:\Users\Admin\AppData\Local\5315918745.exeC:\Users\Admin\AppData\Local\531591~1.EXE -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424B
MD56660904842096ef150959ef515643c49
SHA1d5313164f62f0abd320258e785b51dcecba3fbf6
SHA25600cd66b459cea2a2a05334df2c04ddf3659d59a81bd4f45e95f9f9557e555f6d
SHA512dd58b11c4b79d7eb0fc6bcada3439428018a38b92628674cd42543d7602641a8e26fb65b2ea2f8883537b65bd56ce264cbdf8e5329fd8aca658beaec086daea6
-
Filesize
914KB
MD54bb20eea8ad652d0a7dbc586cc036166
SHA1863491c988880079055c3e32a45dcd4730e2695d
SHA256eb01b6df8e806ed281634df13878069cda1f2fb700f3595719a247e19b01b069
SHA5122e0539938ebf4fa041b0e274e6711700146f6e0694b21b975408e528f6df36c133d1120ae82436f84ab783deffe1b773db75ad5ff6d1af79a1e9e8cb2f087af1