Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
5274485b5c7c11b82b3e1784df5bbd7e.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
5274485b5c7c11b82b3e1784df5bbd7e.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
5274485b5c7c11b82b3e1784df5bbd7e.exe
-
Size
1.1MB
-
MD5
5274485b5c7c11b82b3e1784df5bbd7e
-
SHA1
a0269c06a8f89a6479918e79776291e62c6a271c
-
SHA256
236d02ef3b07d6f568e06af2e99e26fd08f72d43f9fe4a1773e904ea1b05f16e
-
SHA512
330d8b7d2bb336c2ae67b7ec700dfe6e07430a859731ea5af027d8d536668f465b073ce417652bd1129babc52dd8daf4f13b5179625641ca5675dc18f2ba87d6
-
SSDEEP
24576:2WvknOMEdTogcl5Y7sXDeX8NYXHaK9OKvGOb3Mh+2:2UeOMcZslSXHaKBvJ3Mh+2
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 808 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4100 wrote to memory of 808 4100 5274485b5c7c11b82b3e1784df5bbd7e.exe 18 PID 4100 wrote to memory of 808 4100 5274485b5c7c11b82b3e1784df5bbd7e.exe 18 PID 4100 wrote to memory of 808 4100 5274485b5c7c11b82b3e1784df5bbd7e.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\5274485b5c7c11b82b3e1784df5bbd7e.exe"C:\Users\Admin\AppData\Local\Temp\5274485b5c7c11b82b3e1784df5bbd7e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\a2BrmqeX4M\ZZvaV9p3\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2BrmqeX4M\ZZvaV9p3\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:808
-