Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
51f087b4613d27433d8cfcb125ae49d9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51f087b4613d27433d8cfcb125ae49d9.exe
Resource
win10v2004-20231215-en
General
-
Target
51f087b4613d27433d8cfcb125ae49d9.exe
-
Size
344KB
-
MD5
51f087b4613d27433d8cfcb125ae49d9
-
SHA1
56c07063e8453f0b2a36ec6b36570ba3afe103d4
-
SHA256
b06a7de629b646ca4ed7199e522f38db50607784335ba7d7fc716077491532bf
-
SHA512
cadb48749602dab3b377949f885d6db1da37926777da1cc14ddb8558379151cfa32d6052ae0e2699a339b87470c54c97b7ab32f2bf303afda8b6a29013069038
-
SSDEEP
6144:7AjK6l+wlbl3nrZ3ySYi7yjb3TgR4e9Rud3KRmY3PbJQX9zfAxkFfiSCRZRmF9:826l+EbNnrxySYiWgHjRmYfsiSKmF9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 taskenv.exe -
Loads dropped DLL 2 IoCs
pid Process 3052 51f087b4613d27433d8cfcb125ae49d9.exe 3052 51f087b4613d27433d8cfcb125ae49d9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\sysclean = "C:\\ProgramData\\OZEMQECW\\taskenv.exe" 51f087b4613d27433d8cfcb125ae49d9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sysclean = "C:\\ProgramData\\OZEMQECW\\taskenv.exe" 51f087b4613d27433d8cfcb125ae49d9.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\sysclean = "C:\\ProgramData\\OZEMQECW\\taskenv.exe" taskenv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sysclean = "C:\\ProgramData\\OZEMQECW\\taskenv.exe" taskenv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskenv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier taskenv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 taskenv.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3052 51f087b4613d27433d8cfcb125ae49d9.exe 2728 taskenv.exe 2728 taskenv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2728 3052 51f087b4613d27433d8cfcb125ae49d9.exe 28 PID 3052 wrote to memory of 2728 3052 51f087b4613d27433d8cfcb125ae49d9.exe 28 PID 3052 wrote to memory of 2728 3052 51f087b4613d27433d8cfcb125ae49d9.exe 28 PID 3052 wrote to memory of 2728 3052 51f087b4613d27433d8cfcb125ae49d9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\51f087b4613d27433d8cfcb125ae49d9.exe"C:\Users\Admin\AppData\Local\Temp\51f087b4613d27433d8cfcb125ae49d9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\ProgramData\OZEMQECW\taskenv.exeC:\ProgramData\OZEMQECW\taskenv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206B
MD5cd4db47ad48facebe2385f585753ffbe
SHA1996d2630928b30f492230e1977c72e06261d7c7d
SHA25662481d06c721fafd2d574f759f8dcb67196a4d13cdfef52f2bba7bed5fae8f40
SHA5125041c4e377d353bc0651eb2d753f16d76a10ec6a0b69e57c4e9150bf476cfcbfa02d87559d8ee8d32d0665202e66b40969c65fb73dbf0d201c852b28ef7fc09f
-
Filesize
212KB
MD5f651d06be4944c711446cf90e86de649
SHA1559f62b351e408e1fe60362dd3ebc7f8e0de85e5
SHA256f20c2c3c39420a9d03a33f231ef414df6a05c2dd2b5eab945c2f5cb89670d3c5
SHA51237ea39a89d32e3f635dc936a22af05829794f49c22a4b74d4365d41fd49d51f9848d5288e08c3e701e6598c3056cb510bdb31cc8789fae64f64bca3123af35ac