Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
5886bb1be3ecb182711f40cee07b3ef0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5886bb1be3ecb182711f40cee07b3ef0.exe
Resource
win10v2004-20231215-en
General
-
Target
5886bb1be3ecb182711f40cee07b3ef0.exe
-
Size
978KB
-
MD5
5886bb1be3ecb182711f40cee07b3ef0
-
SHA1
52aac383bfaee91573f8007ebdf03cbee2abe8cf
-
SHA256
3f5a252513f60cbb4b19caf221f27ba0f3b97ef36178f5c2d4a80f06387f3bb4
-
SHA512
0cfeb4c9cc89eeba57c655862c75cfa33ce81dadbd9a087eb65b340ff87f7a96586f325cfcfd1f0828702e2a04fd576920d535de1c51160cf3f9ea1fc87486dc
-
SSDEEP
24576:CmT3CK+0EyJqrBcapU1JNzT5b/EQBwk1vJo:C+3D4yJqyaup5b/9wcJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2672 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 6619912.exe -
Loads dropped DLL 4 IoCs
pid Process 2672 cmd.exe 2672 cmd.exe 2796 6619912.exe 2796 6619912.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\5886bb1be3ecb182711f40cee07b3ef0 = "\"C:\\Users\\Admin\\AppData\\Local\\6619912.exe\" 0 24 " 5886bb1be3ecb182711f40cee07b3ef0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\6619912 = "\"C:\\Users\\Admin\\AppData\\Local\\6619912.exe\" 0 37 " 6619912.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2792 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2796 6619912.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2796 6619912.exe 2796 6619912.exe 2796 6619912.exe 2796 6619912.exe 2796 6619912.exe 2796 6619912.exe 2796 6619912.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2796 6619912.exe 2796 6619912.exe 2796 6619912.exe 2796 6619912.exe 2796 6619912.exe 2796 6619912.exe 2796 6619912.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2672 2272 5886bb1be3ecb182711f40cee07b3ef0.exe 31 PID 2272 wrote to memory of 2672 2272 5886bb1be3ecb182711f40cee07b3ef0.exe 31 PID 2272 wrote to memory of 2672 2272 5886bb1be3ecb182711f40cee07b3ef0.exe 31 PID 2272 wrote to memory of 2672 2272 5886bb1be3ecb182711f40cee07b3ef0.exe 31 PID 2672 wrote to memory of 2792 2672 cmd.exe 29 PID 2672 wrote to memory of 2792 2672 cmd.exe 29 PID 2672 wrote to memory of 2792 2672 cmd.exe 29 PID 2672 wrote to memory of 2792 2672 cmd.exe 29 PID 2672 wrote to memory of 2796 2672 cmd.exe 30 PID 2672 wrote to memory of 2796 2672 cmd.exe 30 PID 2672 wrote to memory of 2796 2672 cmd.exe 30 PID 2672 wrote to memory of 2796 2672 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5886bb1be3ecb182711f40cee07b3ef0.exe"C:\Users\Admin\AppData\Local\Temp\5886bb1be3ecb182711f40cee07b3ef0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\32202.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2672
-
-
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 5886bb1be3ecb182711f40cee07b3ef0 /f1⤵
- Modifies registry key
PID:2792
-
C:\Users\Admin\AppData\Local\6619912.exeC:\Users\Admin\AppData\Local\6619912.exe -i1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
978KB
MD55886bb1be3ecb182711f40cee07b3ef0
SHA152aac383bfaee91573f8007ebdf03cbee2abe8cf
SHA2563f5a252513f60cbb4b19caf221f27ba0f3b97ef36178f5c2d4a80f06387f3bb4
SHA5120cfeb4c9cc89eeba57c655862c75cfa33ce81dadbd9a087eb65b340ff87f7a96586f325cfcfd1f0828702e2a04fd576920d535de1c51160cf3f9ea1fc87486dc
-
Filesize
422B
MD5aaf0cd6e53d85228374f8f2c89498899
SHA1c4d7a6dae566019f4923e59fcf9a9064e8a460e6
SHA256c837d73c9c8d94f230565548b607906241cf500b1f6e0b3d00b293b207fc9d96
SHA5127345d642cdcc4046fcc12af3df2c7f693ba46ce090aa0d88b5e8fbd7521cfdbc284f1384a090fce2eb6cc8d448d2b6c81af3785123a587c0297d0d6802914a4a