Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 02:09
Behavioral task
behavioral1
Sample
4c84391a969c7cc81d8584901ad09c69.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c84391a969c7cc81d8584901ad09c69.exe
Resource
win10v2004-20231215-en
General
-
Target
4c84391a969c7cc81d8584901ad09c69.exe
-
Size
919KB
-
MD5
4c84391a969c7cc81d8584901ad09c69
-
SHA1
f1c06f8b99694d8bba50254b10f70a4fed2fec9e
-
SHA256
67c878ff1b2eb68a0a2cf907e948327196aa883c23ab02366e8b742a8c0f8a3c
-
SHA512
72a732d2ea677cc5d0ab46a801d4f01d9ccca834b7e78ad90054b8228285de63f8749bd15cef261af31c3d50e5d61dd8db40ca511eb45cd3045cbe9146955639
-
SSDEEP
24576:sMIuUfj8ss2lhV1vyw/00TYAEYE1As2zz9oY:sxRfj8J2lH1v5bTE165X
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3024 carambis_cleaner_6311e04e2ae94d7c8b1663d45ec9e2728dd1e58e.exe -
Loads dropped DLL 1 IoCs
pid Process 1836 4c84391a969c7cc81d8584901ad09c69.exe -
resource yara_rule behavioral1/memory/1836-0-0x0000000000980000-0x0000000000C42000-memory.dmp upx behavioral1/memory/1836-32-0x0000000000980000-0x0000000000C42000-memory.dmp upx behavioral1/files/0x000900000001225c-43.dat upx behavioral1/memory/1836-47-0x0000000000980000-0x0000000000C42000-memory.dmp upx behavioral1/memory/3024-49-0x0000000000400000-0x0000000002FD4000-memory.dmp upx behavioral1/memory/3024-51-0x0000000000400000-0x0000000002FD4000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA carambis_cleaner_6311e04e2ae94d7c8b1663d45ec9e2728dd1e58e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main carambis_cleaner_6311e04e2ae94d7c8b1663d45ec9e2728dd1e58e.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1836 4c84391a969c7cc81d8584901ad09c69.exe 1836 4c84391a969c7cc81d8584901ad09c69.exe 3024 carambis_cleaner_6311e04e2ae94d7c8b1663d45ec9e2728dd1e58e.exe 3024 carambis_cleaner_6311e04e2ae94d7c8b1663d45ec9e2728dd1e58e.exe 3024 carambis_cleaner_6311e04e2ae94d7c8b1663d45ec9e2728dd1e58e.exe 3024 carambis_cleaner_6311e04e2ae94d7c8b1663d45ec9e2728dd1e58e.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1836 wrote to memory of 3024 1836 4c84391a969c7cc81d8584901ad09c69.exe 28 PID 1836 wrote to memory of 3024 1836 4c84391a969c7cc81d8584901ad09c69.exe 28 PID 1836 wrote to memory of 3024 1836 4c84391a969c7cc81d8584901ad09c69.exe 28 PID 1836 wrote to memory of 3024 1836 4c84391a969c7cc81d8584901ad09c69.exe 28 PID 1836 wrote to memory of 3024 1836 4c84391a969c7cc81d8584901ad09c69.exe 28 PID 1836 wrote to memory of 3024 1836 4c84391a969c7cc81d8584901ad09c69.exe 28 PID 1836 wrote to memory of 3024 1836 4c84391a969c7cc81d8584901ad09c69.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c84391a969c7cc81d8584901ad09c69.exe"C:\Users\Admin\AppData\Local\Temp\4c84391a969c7cc81d8584901ad09c69.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\carambis_cleaner_6311e04e2ae94d7c8b1663d45ec9e2728dd1e58e.exe"C:\Users\Admin\AppData\Local\Temp\carambis_cleaner_6311e04e2ae94d7c8b1663d45ec9e2728dd1e58e.exe" /partnerId=program /vid=6482⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.9MB
MD5c75559ff371b96bcffc17e2b292244a2
SHA16311e04e2ae94d7c8b1663d45ec9e2728dd1e58e
SHA256a7370da996bbf71cc24b00511628f783b7ec3f620d9a72faf41b9189bd8a4df1
SHA512da51639b3891ae0b74d8ef4c6e6308304e1ca63696d85ac8680674f34ff0e311933c97c58dc140719a0827df4bf51d779363e716da4c9274f0a530a0706b9c8c