Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
58cbe9a20b53d89afaf40c0ef190b033.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58cbe9a20b53d89afaf40c0ef190b033.exe
Resource
win10v2004-20231215-en
General
-
Target
58cbe9a20b53d89afaf40c0ef190b033.exe
-
Size
527KB
-
MD5
58cbe9a20b53d89afaf40c0ef190b033
-
SHA1
4f9fbde2fc0c8b414507f5c564f609890f3b1716
-
SHA256
210f98b944421ed95d192ff591c5eb4992760bd7112674c78851f6ae286f20ab
-
SHA512
97363820fb6adffe9046cd36689d65be2065afedd7178e0b3acf4d059e080b4c0592f6ceb08749eeb82e88fb07ba6a7f8ef6bcc134d204c2094d12d2759c7143
-
SSDEEP
6144:6ZOYqQOHwd4Z6aeUT75+niG7sPFpWmU0rLHKQMNbuHy6BEXb3zXBJXtPP5kU4n3U:6ZGQKZ7r1y7kr2xNBtfftPmUEs+zC
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2416 vWLKdLDhCL.exe -
Loads dropped DLL 3 IoCs
pid Process 1768 58cbe9a20b53d89afaf40c0ef190b033.exe 1768 58cbe9a20b53d89afaf40c0ef190b033.exe 2416 vWLKdLDhCL.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\vWLKdLDhCL.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vWLKdLDhCL.exe" 58cbe9a20b53d89afaf40c0ef190b033.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1768 58cbe9a20b53d89afaf40c0ef190b033.exe 1768 58cbe9a20b53d89afaf40c0ef190b033.exe 2416 vWLKdLDhCL.exe 2416 vWLKdLDhCL.exe 2416 vWLKdLDhCL.exe 2416 vWLKdLDhCL.exe 2416 vWLKdLDhCL.exe 2416 vWLKdLDhCL.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1768 58cbe9a20b53d89afaf40c0ef190b033.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 vWLKdLDhCL.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2416 vWLKdLDhCL.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1768 58cbe9a20b53d89afaf40c0ef190b033.exe 2416 vWLKdLDhCL.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2416 1768 58cbe9a20b53d89afaf40c0ef190b033.exe 28 PID 1768 wrote to memory of 2416 1768 58cbe9a20b53d89afaf40c0ef190b033.exe 28 PID 1768 wrote to memory of 2416 1768 58cbe9a20b53d89afaf40c0ef190b033.exe 28 PID 1768 wrote to memory of 2416 1768 58cbe9a20b53d89afaf40c0ef190b033.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 58cbe9a20b53d89afaf40c0ef190b033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 58cbe9a20b53d89afaf40c0ef190b033.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58cbe9a20b53d89afaf40c0ef190b033.exe"C:\Users\Admin\AppData\Local\Temp\58cbe9a20b53d89afaf40c0ef190b033.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\vWLKdLDhCL.exe"C:\Users\Admin\AppData\Local\Temp\vWLKdLDhCL.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5746bf2ca2fd18b6d9929563cf7684d10
SHA14835b96432562d99de51396dcc946fd3d96ba26f
SHA256e5a23252935d9abf1507cb9349dc4456a4f7bc4737e9de47bfeeaa3eb0ae57eb
SHA5127aaba542696ff0cba23083dde21f461b964b340347abda5a56f5d7ac55a4c56e59be58c2bd10858f292931794d628a8c905fac61d1bcba8b295d6387ca282d96
-
Filesize
193KB
MD518a691428bea4e91014fce2cd8263206
SHA1b5f5bc103f5cc7c1caf61372eb7762d24c34a7cf
SHA2569e14e8e4cf8f25bc865db104aa88c6c68b6c94b5608c4f245b5d25251b0cee7a
SHA512b84687ac64d78ac0b60347eca196dcd436fd209e68af60b888ae39e3b2e9750a44b50e314d9f4eea40de840739147a606049841ed305260409973e39565ca40d
-
Filesize
527KB
MD558cbe9a20b53d89afaf40c0ef190b033
SHA14f9fbde2fc0c8b414507f5c564f609890f3b1716
SHA256210f98b944421ed95d192ff591c5eb4992760bd7112674c78851f6ae286f20ab
SHA51297363820fb6adffe9046cd36689d65be2065afedd7178e0b3acf4d059e080b4c0592f6ceb08749eeb82e88fb07ba6a7f8ef6bcc134d204c2094d12d2759c7143