Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
56a11d42e185594f15ca13307e3b8803.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56a11d42e185594f15ca13307e3b8803.exe
Resource
win10v2004-20231215-en
General
-
Target
56a11d42e185594f15ca13307e3b8803.exe
-
Size
319KB
-
MD5
56a11d42e185594f15ca13307e3b8803
-
SHA1
117d5ecb4d77c833db938702c1d3c199c690d24a
-
SHA256
966d59c3472a79da16791a85b2094b15009148c72054074787eed977520b7b8f
-
SHA512
d44523063c65087b4dedecf57b443b0e5faa5e4045c4dac7b80e548799e3e7de9431426891aff43dcd0440a14fce468f0e8029bbe5e975a434e185c664cc9e80
-
SSDEEP
3072:qA4jqSSpO3YlFO4pG6WR+PQjiH6xti2R50YjPdUoLuI2ugUce9FtlD7y4Nhk3SvC:qyO3IBvGuHuggDt95Pk3Eawc97WP
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1960 otb.exe -
Executes dropped EXE 1 IoCs
pid Process 1960 otb.exe -
Loads dropped DLL 2 IoCs
pid Process 2240 56a11d42e185594f15ca13307e3b8803.exe 2240 56a11d42e185594f15ca13307e3b8803.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2240 56a11d42e185594f15ca13307e3b8803.exe 2240 56a11d42e185594f15ca13307e3b8803.exe 2240 56a11d42e185594f15ca13307e3b8803.exe 2240 56a11d42e185594f15ca13307e3b8803.exe 2240 56a11d42e185594f15ca13307e3b8803.exe 2240 56a11d42e185594f15ca13307e3b8803.exe 2240 56a11d42e185594f15ca13307e3b8803.exe 2240 56a11d42e185594f15ca13307e3b8803.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2420 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1960 2240 56a11d42e185594f15ca13307e3b8803.exe 28 PID 2240 wrote to memory of 1960 2240 56a11d42e185594f15ca13307e3b8803.exe 28 PID 2240 wrote to memory of 1960 2240 56a11d42e185594f15ca13307e3b8803.exe 28 PID 2240 wrote to memory of 1960 2240 56a11d42e185594f15ca13307e3b8803.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\56a11d42e185594f15ca13307e3b8803.exe"C:\Users\Admin\AppData\Local\Temp\56a11d42e185594f15ca13307e3b8803.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\otb.exe"C:\Users\Admin\AppData\Local\otb.exe" -gav C:\Users\Admin\AppData\Local\Temp\56a11d42e185594f15ca13307e3b8803.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:1960
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD50be35baa3796a735b8931700277ea6a5
SHA19563c2b3d25cf976fc840b07a6b278d7d2df44cf
SHA256c22b88ec5616e7fb0c45622b4427aa9f621eff7aa4a3c0536eaf8a55fddd44ac
SHA51235a1d8a70bd67390c54382a280085a95a701755e68ebca628b3e6898f2a0b32f203df1a2acd93619cf3260ffaaedfc66d098897a05e70cb1f2cb90d0c8251546