Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
641971793ccca4d7e2803dc5f92e7e38.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
641971793ccca4d7e2803dc5f92e7e38.exe
Resource
win10v2004-20231215-en
General
-
Target
641971793ccca4d7e2803dc5f92e7e38.exe
-
Size
10.7MB
-
MD5
641971793ccca4d7e2803dc5f92e7e38
-
SHA1
2a9eac67292185bfbf1dae2b93b2a81f0cc38e60
-
SHA256
326a701ef8502fbf08dcb9a45a90f19444238c16b11ee2d0632393802a2d94a6
-
SHA512
4169291a65b18f086c8eb321d61264082ea4c35db0e875a9ca9ddf86d2d2e4cca6b3c62328587f4ebbc7248cd7225421bdc87ca2665e552eb9bd73e2ad041bca
-
SSDEEP
49152:EQFRHrmQG+yrY+FrBQG+n+lBQG+0HrmQG+y1HrFQG+yrY+FrBQG+n+lBQG+0Hrml:EcKHfDKNBHfDKNKDKNBHfDXHfDKNKDb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2680 hnruwy.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 641971793ccca4d7e2803dc5f92e7e38.exe 1996 641971793ccca4d7e2803dc5f92e7e38.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main hnruwy.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 hnruwy.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2680 hnruwy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 hnruwy.exe 2680 hnruwy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2680 1996 641971793ccca4d7e2803dc5f92e7e38.exe 28 PID 1996 wrote to memory of 2680 1996 641971793ccca4d7e2803dc5f92e7e38.exe 28 PID 1996 wrote to memory of 2680 1996 641971793ccca4d7e2803dc5f92e7e38.exe 28 PID 1996 wrote to memory of 2680 1996 641971793ccca4d7e2803dc5f92e7e38.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\641971793ccca4d7e2803dc5f92e7e38.exe"C:\Users\Admin\AppData\Local\Temp\641971793ccca4d7e2803dc5f92e7e38.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\hnruwy.exeC:\Users\Admin\AppData\Local\Temp\hnruwy.exe -run C:\Users\Admin\AppData\Local\Temp\641971793ccca4d7e2803dc5f92e7e38.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD506b39b9f8241628b5b7116eab1896e18
SHA1f6b78b0bb3ad38bb156f14c26960680d26a82bf3
SHA2568b394d7fc5c9f672a2816ce28bafa89a6e925707a3e25fdba35cb30dfee0e0cc
SHA5124153753b2da0a6089202682e478a7afd918d02ff1dc9f52ecf425429080b808075e82927fa6ae06e6c2564ac02874eba54890f622bfbeef28501bea6e4a3c54c
-
Filesize
927KB
MD584505ee53e7eab768938cb1e418efd10
SHA10ec93d7338f0e35b244ebf6669692419c99ff7be
SHA256610b8a24a2c70432c4b743ea6f31ca285fcce7b78abb91281ac9bb9191e116fa
SHA512d6cce3a2bb256f131646e8bea247183af1886c8ea35f0ef6c415e544ca76317bcd7d42f990b237d0235d035ea31178be6800322ab63ecfa560f294d649bad60f
-
Filesize
435KB
MD5a358ffbe2af57b0459b1970613d5d37f
SHA14e959921815fc3a1e4f639d92da8face3ee47f04
SHA256f33a3749f48b0f7b08f728d0e0fc55745e2676b03a1f35a47c435dde6970f6c8
SHA512a096eac18438bd8f17427914b1fe2c8bff613028af31e0e7154be40b0428f71baf25dad53ed07c2977e40992c2b6c0b9a718a632bbc0a151adc2f2ed11c4a821
-
Filesize
1.4MB
MD565b0ffacf90fc4328d49373e4eb68d39
SHA10cb2bdc432ec572b2108b1c240dcbf18e41db9da
SHA256c835ee9318d338777e37ac051ace639ef8dd52b7cfef1505dba9e350809593d9
SHA51254aac7eb410c045608d1b6ec11924eb921656836ec290b629d8a267f2840f8c4b9b9df0a41ceeaf2d6cd1402eeb1aa21cc9e678a2e078d4537607779bb6fe388
-
Filesize
1.3MB
MD58e90effb373b4eadc386ae2cfe78b018
SHA1428e52b24ea78caa1c7fff53bc138aa61edc5936
SHA25664ff4a5d93086abfb37039aed46bb08458ce85fbfb1a92f95b1b5fab481600bd
SHA512c22380d9b2cf90a18c127f9b31c0fb72a68a975f5ad3aa1c3d6be220cfc3a54c7cbf911f883248d0307854a3ab746e1cbee0288fef051734f50e0109e2d720f2