Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
56027bc4627bb9dbcd6a5cd2ef56dd86.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56027bc4627bb9dbcd6a5cd2ef56dd86.exe
Resource
win10v2004-20231215-en
General
-
Target
56027bc4627bb9dbcd6a5cd2ef56dd86.exe
-
Size
593KB
-
MD5
56027bc4627bb9dbcd6a5cd2ef56dd86
-
SHA1
119c42a51bca9c3e515e32d148fc8bf39f4edd08
-
SHA256
c26de313755d31e46e4514305f904225d2f3468a166e5a8c9f684952e9093c9b
-
SHA512
b453e56e2c9488ceac60f5a4a91f2cd2ccb6d73d7ad2c4dcdfdebcf7def385721f2295e90a478e1c2bda0f47522ed344c8ef6fbb20078e3bef9e0ac8c5b8b044
-
SSDEEP
12288:kHWYg1ieQ7NfOKn2NkBjm1q0BbTgoWTHQo30veJTv3PdEOgT:kHtf7/nsamY0BgoNRGJTpc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2376 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2596 8.com.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 8.com.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\UNINSTAL.BAT 56027bc4627bb9dbcd6a5cd2ef56dd86.exe File created C:\Windows\8.com.exe 56027bc4627bb9dbcd6a5cd2ef56dd86.exe File opened for modification C:\Windows\8.com.exe 56027bc4627bb9dbcd6a5cd2ef56dd86.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 8.com.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\12-a0-b2-48-c4-8e 8.com.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections 8.com.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\WpadNetworkName = "Network 3" 8.com.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e\WpadDecisionReason = "1" 8.com.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e\WpadDecision = "0" 8.com.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 8.com.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\WpadDecisionTime = f0767a503445da01 8.com.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 8.com.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 8.com.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e 8.com.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e\WpadDetectedUrl 8.com.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" 8.com.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 8.com.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\WpadDecisionReason = "1" 8.com.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\WpadDecision = "0" 8.com.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 8.com.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e\WpadDecisionTime = 903b0f1b3445da01 8.com.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 8.com.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 8.com.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 8.com.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 8.com.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 8.com.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147} 8.com.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 8.com.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad 8.com.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\WpadDecisionTime = 903b0f1b3445da01 8.com.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e\WpadDecisionTime = f0767a503445da01 8.com.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2912 56027bc4627bb9dbcd6a5cd2ef56dd86.exe Token: SeDebugPrivilege 2596 8.com.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 8.com.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2376 2912 56027bc4627bb9dbcd6a5cd2ef56dd86.exe 29 PID 2912 wrote to memory of 2376 2912 56027bc4627bb9dbcd6a5cd2ef56dd86.exe 29 PID 2912 wrote to memory of 2376 2912 56027bc4627bb9dbcd6a5cd2ef56dd86.exe 29 PID 2912 wrote to memory of 2376 2912 56027bc4627bb9dbcd6a5cd2ef56dd86.exe 29 PID 2912 wrote to memory of 2376 2912 56027bc4627bb9dbcd6a5cd2ef56dd86.exe 29 PID 2912 wrote to memory of 2376 2912 56027bc4627bb9dbcd6a5cd2ef56dd86.exe 29 PID 2912 wrote to memory of 2376 2912 56027bc4627bb9dbcd6a5cd2ef56dd86.exe 29 PID 2596 wrote to memory of 2212 2596 8.com.exe 30 PID 2596 wrote to memory of 2212 2596 8.com.exe 30 PID 2596 wrote to memory of 2212 2596 8.com.exe 30 PID 2596 wrote to memory of 2212 2596 8.com.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\56027bc4627bb9dbcd6a5cd2ef56dd86.exe"C:\Users\Admin\AppData\Local\Temp\56027bc4627bb9dbcd6a5cd2ef56dd86.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\UNINSTAL.BAT2⤵
- Deletes itself
PID:2376
-
-
C:\Windows\8.com.exeC:\Windows\8.com.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2212
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD556027bc4627bb9dbcd6a5cd2ef56dd86
SHA1119c42a51bca9c3e515e32d148fc8bf39f4edd08
SHA256c26de313755d31e46e4514305f904225d2f3468a166e5a8c9f684952e9093c9b
SHA512b453e56e2c9488ceac60f5a4a91f2cd2ccb6d73d7ad2c4dcdfdebcf7def385721f2295e90a478e1c2bda0f47522ed344c8ef6fbb20078e3bef9e0ac8c5b8b044
-
Filesize
186B
MD5404b3eab3b564f74ef8665e7bce4e3ed
SHA1daef2da3f13798ed15c5e12c1b2ec6828b8d2752
SHA256867998cd3a54b42a89f9d32838e7ae9e146c6bfe7584b1ac854362bd650e084d
SHA5129bb610111876179a0c6a666c14688403970a366a981daa8d3b9e9ce9fed56eee4b1973d42fbada8600afc205689ca1992c52677d1404d86626568b9d461fe84f