Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 18:36
Behavioral task
behavioral1
Sample
5b900519dab644bbf016309ef4a45bf7.exe
Resource
win7-20231215-en
General
-
Target
5b900519dab644bbf016309ef4a45bf7.exe
-
Size
9KB
-
MD5
5b900519dab644bbf016309ef4a45bf7
-
SHA1
4ded0939b2e45eccadbdefadcc4476533317e5e1
-
SHA256
409626fe693996b98a2614fe717ae001a5c9609fc2546f2015554feec2b2e58b
-
SHA512
399cc94dbaf377ded833951be7cf1a1340fe4f50508ed154202f1cb5ccc9ac875d542c0f296479020e43e1ed6f0b890e76f10d273c50773cff3b1b10de8dbf40
-
SSDEEP
192:TUIxUWxbkf40IUTfwrwJgAUJD2aZ1ZUWO8ppWwa:TUkUCbD0IUUiPU922ZUWO8ppWd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1076 iexplore.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.exe 5b900519dab644bbf016309ef4a45bf7.exe -
Executes dropped EXE 1 IoCs
pid Process 1076 iexplore.exe -
Loads dropped DLL 2 IoCs
pid Process 1572 5b900519dab644bbf016309ef4a45bf7.exe 1572 5b900519dab644bbf016309ef4a45bf7.exe -
resource yara_rule behavioral1/memory/1572-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x000c000000013a83-3.dat upx behavioral1/memory/1572-9-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1076-13-0x0000000000400000-0x000000000040A000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explore 5b900519dab644bbf016309ef4a45bf7.exe File opened for modification C:\Program Files\Internet Explore\iexplore.exe 5b900519dab644bbf016309ef4a45bf7.exe File created C:\Program Files\Internet Explore\iexplore.exe 5b900519dab644bbf016309ef4a45bf7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1076 1572 5b900519dab644bbf016309ef4a45bf7.exe 28 PID 1572 wrote to memory of 1076 1572 5b900519dab644bbf016309ef4a45bf7.exe 28 PID 1572 wrote to memory of 1076 1572 5b900519dab644bbf016309ef4a45bf7.exe 28 PID 1572 wrote to memory of 1076 1572 5b900519dab644bbf016309ef4a45bf7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b900519dab644bbf016309ef4a45bf7.exe"C:\Users\Admin\AppData\Local\Temp\5b900519dab644bbf016309ef4a45bf7.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files\Internet Explore\iexplore.exe"C:\Program Files\Internet Explore\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b900519dab644bbf016309ef4a45bf7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD55b900519dab644bbf016309ef4a45bf7
SHA14ded0939b2e45eccadbdefadcc4476533317e5e1
SHA256409626fe693996b98a2614fe717ae001a5c9609fc2546f2015554feec2b2e58b
SHA512399cc94dbaf377ded833951be7cf1a1340fe4f50508ed154202f1cb5ccc9ac875d542c0f296479020e43e1ed6f0b890e76f10d273c50773cff3b1b10de8dbf40