Analysis
-
max time kernel
140s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
4e17baaabd9c22f840fe309d1456cc14.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e17baaabd9c22f840fe309d1456cc14.exe
Resource
win10v2004-20231222-en
General
-
Target
4e17baaabd9c22f840fe309d1456cc14.exe
-
Size
1.0MB
-
MD5
4e17baaabd9c22f840fe309d1456cc14
-
SHA1
3a0250bc1813678436e0d53e60604ea1386d6af7
-
SHA256
3c0538962b982b991eee6bc7f3120b84664f57a18bbc21eda3a4d1754644de2c
-
SHA512
7a6c79cb6c97e08368b581d528780dcf46e1a931efdcd3a08d25c38d560b98ebbab7028e102a8afa94aefcdbabbebb0511f842fca0cc9b1c54c6a32348b6755c
-
SSDEEP
24576:aNmLc8UKe0Hxzgf5qg4a4VgbEHgXvKHTXoMibFIwOu:aDKeixUfj4HgYHgfkTYMMFIwO
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2856 4e17baaabd9c22f840fe309d1456cc14.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2884 2856 WerFault.exe 4 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main 4e17baaabd9c22f840fe309d1456cc14.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2856 4e17baaabd9c22f840fe309d1456cc14.exe 2856 4e17baaabd9c22f840fe309d1456cc14.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2884 2856 4e17baaabd9c22f840fe309d1456cc14.exe 32 PID 2856 wrote to memory of 2884 2856 4e17baaabd9c22f840fe309d1456cc14.exe 32 PID 2856 wrote to memory of 2884 2856 4e17baaabd9c22f840fe309d1456cc14.exe 32 PID 2856 wrote to memory of 2884 2856 4e17baaabd9c22f840fe309d1456cc14.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e17baaabd9c22f840fe309d1456cc14.exe"C:\Users\Admin\AppData\Local\Temp\4e17baaabd9c22f840fe309d1456cc14.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 19082⤵
- Program crash
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
5KB
MD5036af3fceab406a0f64c0f52034f76e5
SHA16db1a1e1085e23a33719865a5fbef4e722cf9518
SHA25679bdad673a5b1bc6a9df2415ccc8283370441c060be76a425e3c44132b6676e7
SHA5126fb28664c5a82b1eae33bb95e69aa2da533cb8b1137630855b75b48785b93f1af8d636a22570a5cbe2f667cccb307ebc1b0a434e10cee29670dd4eadc68cfe07
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
25KB
MD571c80dde59856b701903b2fc0f91b075
SHA110265b56b1db49ec524b6832e14b0b4f08f26e1a
SHA25645a11c15657eafada47d1b40f23ad47a067b6882c45f7d2e1754305aba40db4e
SHA51235bc4a16852e589e3654f50dd2822e8310cc3f9287f95a7df6d8756af6e461822123d134aff7190c40bfed5545400b0dc9d30f70126750e0c45fb3d9902738d6
-
Filesize
809B
MD51c6138108b31f0ad1c8f22f6f569f6de
SHA1d6f3a9b3af755183b8fad5e00a3f00c81053d66a
SHA2568b07d29151a7af1ff97f312e972e1609c50890cf0787c3b9e860bae853321040
SHA512b539d67d669af93c22b33c431473a310bb983e4979caed6a74bf1993cd949714f42aad157c3357e2cfac2cfbffb6c3fda9d6e7e4089fdca8996d5b752c571901
-
Filesize
1KB
MD5eda0f9fe2914bc66f4ad4861f6db1a1f
SHA1ad525e4558276d81b52c2fc8b6d09352a270ee1c
SHA256e325ce8afd3f60969a3465d0a221d2f023e1c4fa88a48b551328ab715c5bb8fb
SHA512ac7bd622f6a1eae051e29f59f8010d44ca3293aa89549b0e2575655cb8e21012517f5c3cfc0f73ef3b48dff78c84ec79d51cc3c8cc7e5e6cf16ece2c6e9aece2
-
Filesize
1KB
MD502931901ed9381a0ac04384ddc55a8ae
SHA1fe447aff5155d46dfde8570caa1c5b2e30b7a2c7
SHA256216cf446b17585d388b1105409c8c24aa962e6ab1f660d6959c7f8ffcf6aa103
SHA51203c89f7918058b4013b1ca9151a7be314a0ba2bc02cc56961e6a6fde8fb516b84ec37268644f8bba730f64073e3e6d15e404912c4d3e85a5a5e1d2df2badf29f
-
Filesize
1KB
MD5b6e30cf41d44ec03cdf9cb05c622f8e3
SHA1885ac809976d64dd7fafe92df4cb615521766ed3
SHA256342b0b36ee6c9922fcb6f1add3cf46b5e41dc2d0fd8572481467dcc3c05c27dc
SHA512522717ef48698f5dd3985a0477608bee6dfd0d2344e573301112461f83c0ee5fbe530b99e001e61ab1d76817d7ad32219ea9c8a7d39f95599a5e358903bf0b53
-
Filesize
236B
MD595cbac4dc07f686c45f154a394e67869
SHA18fdca7e090767be4e422371fb0dbf03b4ad8352e
SHA2563e12544469963fbeaeb1a7bc9de7026bcf639bf17c3ae424b2e4809058578a5d
SHA5126d99ff303b6da5ec950894d93a7baa82a328aa517e461a2d8a625f9728afbc03116bbdedbdde9b61abedc203b2c64ce2fba2bbd86dc4099f391c931e6f5225a9
-
Filesize
10KB
MD557ca1a2085d82f0574e3ef740b9a5ead
SHA12974f4bf37231205a256f2648189a461e74869c0
SHA256476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA5122d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c
-
Filesize
1.0MB
MD54e17baaabd9c22f840fe309d1456cc14
SHA13a0250bc1813678436e0d53e60604ea1386d6af7
SHA2563c0538962b982b991eee6bc7f3120b84664f57a18bbc21eda3a4d1754644de2c
SHA5127a6c79cb6c97e08368b581d528780dcf46e1a931efdcd3a08d25c38d560b98ebbab7028e102a8afa94aefcdbabbebb0511f842fca0cc9b1c54c6a32348b6755c