Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 14:24
Behavioral task
behavioral1
Sample
50cca6d5286ca71e76ed028a784bb458.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
50cca6d5286ca71e76ed028a784bb458.exe
Resource
win10v2004-20231215-en
General
-
Target
50cca6d5286ca71e76ed028a784bb458.exe
-
Size
807KB
-
MD5
50cca6d5286ca71e76ed028a784bb458
-
SHA1
5e464e0ba7389ddee0477d315b37312085f8abc0
-
SHA256
1532412d64c5c90d7385ec92c81c91b3a5f434d9351082d4e97230ee7c9ba656
-
SHA512
7c87a7380a26d73987a1eb0d177c59b9ab1473f51dbb041edcf3bcf4403a1a317b3f8d5e599cb81543a41ae2174cf69a76fcf84a037f03e138b1813e87b896c4
-
SSDEEP
12288:qc8Ua5Xe9YKd3taCgDih+qF0VGPfhvbB4ST+A5YApOvcx/5BURVHZnZGp2rVq0f:qj/2YecJW+NEd6Sd5Y4Ovch6jZc2ro0f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2196 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 50cca6d5286ca71e76ed028a784bb458.exe -
resource yara_rule behavioral1/memory/2368-0-0x0000000000930000-0x0000000000B8F000-memory.dmp upx behavioral1/files/0x000b000000014b31-2.dat upx behavioral1/memory/2368-4-0x0000000002920000-0x0000000002B7F000-memory.dmp upx behavioral1/memory/2196-9-0x00000000003A0000-0x00000000005FF000-memory.dmp upx behavioral1/files/0x000b000000014b31-8.dat upx behavioral1/memory/2368-7-0x0000000000930000-0x0000000000B8F000-memory.dmp upx behavioral1/memory/2196-29-0x00000000003A0000-0x00000000005FF000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" setup.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main setup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 setup.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2196 setup.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2368 50cca6d5286ca71e76ed028a784bb458.exe 2368 50cca6d5286ca71e76ed028a784bb458.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe 2196 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2196 2368 50cca6d5286ca71e76ed028a784bb458.exe 28 PID 2368 wrote to memory of 2196 2368 50cca6d5286ca71e76ed028a784bb458.exe 28 PID 2368 wrote to memory of 2196 2368 50cca6d5286ca71e76ed028a784bb458.exe 28 PID 2368 wrote to memory of 2196 2368 50cca6d5286ca71e76ed028a784bb458.exe 28 PID 2368 wrote to memory of 2196 2368 50cca6d5286ca71e76ed028a784bb458.exe 28 PID 2368 wrote to memory of 2196 2368 50cca6d5286ca71e76ed028a784bb458.exe 28 PID 2368 wrote to memory of 2196 2368 50cca6d5286ca71e76ed028a784bb458.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\50cca6d5286ca71e76ed028a784bb458.exe"C:\Users\Admin\AppData\Local\Temp\50cca6d5286ca71e76ed028a784bb458.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD560995d04e55f8d138cf5183e95942906
SHA1d90f51dd6705b94d7d3915dad623f61a7654a410
SHA25605b3464493d500473e1370aafd8c0b8db1678bd38353237141997607caf5c132
SHA5123886ba8025d96b3ba1522def75b997aec503505c14ec3364bba93fa8a5509c792b44bc67a9afbfcc4af9047bad69ae7c9dfd61ec094079cf7ddf3838704af871
-
Filesize
807KB
MD550cca6d5286ca71e76ed028a784bb458
SHA15e464e0ba7389ddee0477d315b37312085f8abc0
SHA2561532412d64c5c90d7385ec92c81c91b3a5f434d9351082d4e97230ee7c9ba656
SHA5127c87a7380a26d73987a1eb0d177c59b9ab1473f51dbb041edcf3bcf4403a1a317b3f8d5e599cb81543a41ae2174cf69a76fcf84a037f03e138b1813e87b896c4