Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 03:16
Behavioral task
behavioral1
Sample
5bfd78bced71dbab1a14d6b2c4282e1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bfd78bced71dbab1a14d6b2c4282e1a.exe
Resource
win10v2004-20231215-en
General
-
Target
5bfd78bced71dbab1a14d6b2c4282e1a.exe
-
Size
208KB
-
MD5
5bfd78bced71dbab1a14d6b2c4282e1a
-
SHA1
6c42e977cbfcbc19e157b77d36e6eacb7846cc86
-
SHA256
056da63b22afcd3adff79b4da85d0a672bb0bd9a6674c37b77f991e20bf0fb4a
-
SHA512
77ab53248a39b5a9cfb38de9d40be5b8da65ee54f55c8df17baccc582c4288db09063e1548084ff391194d7be3f00b93bd224d3c69332f7e5ee20c238899509e
-
SSDEEP
6144:TqchxygjVJbRE6g6fM2W/RrbwgS1o2x2XJoS:mqIgj3bRGSgyxUoS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explоrer.exe" 5bfd78bced71dbab1a14d6b2c4282e1a.exe -
Deletes itself 1 IoCs
pid Process 2760 explоrer.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 explоrer.exe -
resource yara_rule behavioral1/memory/1396-0-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/files/0x00080000000120f8-10.dat upx behavioral1/memory/2760-14-0x0000000000400000-0x0000000000462000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\explоrer.exe 5bfd78bced71dbab1a14d6b2c4282e1a.exe File opened for modification C:\Windows\explоrer.exe 5bfd78bced71dbab1a14d6b2c4282e1a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe 2920 iexplore.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2760 explоrer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1780 vssvc.exe Token: SeRestorePrivilege 1780 vssvc.exe Token: SeAuditPrivilege 1780 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 ctfmon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1396 wrote to memory of 2760 1396 5bfd78bced71dbab1a14d6b2c4282e1a.exe 28 PID 1396 wrote to memory of 2760 1396 5bfd78bced71dbab1a14d6b2c4282e1a.exe 28 PID 1396 wrote to memory of 2760 1396 5bfd78bced71dbab1a14d6b2c4282e1a.exe 28 PID 1396 wrote to memory of 2760 1396 5bfd78bced71dbab1a14d6b2c4282e1a.exe 28 PID 2760 wrote to memory of 2920 2760 explоrer.exe 31 PID 2760 wrote to memory of 2920 2760 explоrer.exe 31 PID 2760 wrote to memory of 2920 2760 explоrer.exe 31 PID 2760 wrote to memory of 2920 2760 explоrer.exe 31 PID 2920 wrote to memory of 1948 2920 iexplore.exe 33 PID 2920 wrote to memory of 1948 2920 iexplore.exe 33 PID 2920 wrote to memory of 1948 2920 iexplore.exe 33 PID 2920 wrote to memory of 1948 2920 iexplore.exe 33 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bfd78bced71dbab1a14d6b2c4282e1a.exe"C:\Users\Admin\AppData\Local\Temp\5bfd78bced71dbab1a14d6b2c4282e1a.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\explоrer.exe"C:\Windows\explоrer.exe" C:\Users\Admin\AppData\Local\Temp\5bfd78bced71dbab1a14d6b2c4282e1a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe4⤵
- Suspicious use of FindShellTrayWindow
PID:1948
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YV6H14B0\ib2[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
208KB
MD55bfd78bced71dbab1a14d6b2c4282e1a
SHA16c42e977cbfcbc19e157b77d36e6eacb7846cc86
SHA256056da63b22afcd3adff79b4da85d0a672bb0bd9a6674c37b77f991e20bf0fb4a
SHA51277ab53248a39b5a9cfb38de9d40be5b8da65ee54f55c8df17baccc582c4288db09063e1548084ff391194d7be3f00b93bd224d3c69332f7e5ee20c238899509e